Vulnhub/ PG/ THM/ HTB
Quick Writeups for Vulnhub/ PG Machines/ THM/ HTB
Last updated
Was this helpful?
Quick Writeups for Vulnhub/ PG Machines/ THM/ HTB
Last updated
Was this helpful?
USER
User : OSCP
User-Agent: * Disallow: /secret.txt
In robots.txt, we get base64 encoded Private SSH Key.
ssh oscp@IP_ADDRESS -i id_rsa
ROOT
SUID bash binary
/bin/bash -p
Unintended Methods:
USER : Dirbuster -> Login with admin:admin, edit image and upload PHP reverse shell. SSH with password.txt ROOT : sudo time /bin/bash
USER : smbclient //192.168.178.11/ITDEPT
Management.log in :80/logs shows web-control running as root.
uploaded python shell in smb ITDEPT share with name 'web-control'
Got reverse shell with cron.
ROOT : checking for SUID BITS, found /usr/bin/zsh -> euid=0
HTB - Late (Image to Text Application built with Flask)
Execute sandboxed Lua scripts through the “EVAL” command using dofile(), Capturing NTLM hash via responder by connecting with //tun0-ip//share, Powerview and sharpHound, BloodHound for enumeration and Abusing GPO Permission via SharpGPOAbuse.exe
Enumerating subdomains and finding CMS "typo3", backend api call for SQLi, password cracking to get in typo3 panel, uploaded reverse shell, cracked user mozilla history to find credentials, getcap to find openssl binary to read and replace passwd file to get root.