HackTheBox - Atom
00:00 - Intro
00:50 - Start of nmap
02:15 - Running RPCDump which shows if this is vulnerable to PrintNightmare (Exploit it later)
03:00 - Examining the webpage
04:15 - Explaining why i use lowercase wordlists on against Windows Webservers
06:00 - Listing shares with smbclient to find an open share
07:30 - Decompiling the Electron installer/app with asar
12:00 - Everything is extracted looking at package.json and main.js to find electron-updater
14:10 - Searching for exploits within Electron
15:30 - Using MSFVENOM to build a reverse shell
16:45 - Editing our installer YAML to point to our reverse shell
19:30 - Putting the files on the share and getting our reverse shell
21:30 - Exploring the box to find PortableKanban
22:30 - Copying the config to our box so we can extract the database password
25:40 - Using CyberChef to decrypt the Portable Kanban password
28:20 - Authenticating to Redit-CLI and dumping the user information to get administrator password
30:30 - Using rundll32 to create a memory dump of LSASS so we can extract a password
32:30 - Downloading lsass.dmp with evil-winrm
35:30 - Using Pypykatz to parse the dump file and get Jason's password
38:30 - Building our environment to perform CVE-2021-1675 (PrintNightmare)
42:50 - Using PrintNightmare to connect to our netcat to verify it is vulnerable
44:20 - Building a DLL to send a reverse shell
46:50 - Having trouble with Impacket's SMBServer, configuring our local SMBD to work with this exploit
49:20 - Reading more errors from impacket to verify we do have code execution
50:10 - Giving a file that doesn't exist to see another error... More verifying that this is working
51:20 - Giving it our ReverseShell DLL to get a reverse shell
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: LLM Foundations
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Elon Musk Boosts New Yorker’s Sam Altman Exposé on X as Trial Begins
Wired AI
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
The Half-Life of Information
Medium · AI
The crypto-to-AI bandwagon jumpers' club just landed another member: Core Scientific
The Register
Chapters (26)
Intro
0:50
Start of nmap
2:15
Running RPCDump which shows if this is vulnerable to PrintNightmare (Exploit i
3:00
Examining the webpage
4:15
Explaining why i use lowercase wordlists on against Windows Webservers
6:00
Listing shares with smbclient to find an open share
7:30
Decompiling the Electron installer/app with asar
12:00
Everything is extracted looking at package.json and main.js to find electron-u
14:10
Searching for exploits within Electron
15:30
Using MSFVENOM to build a reverse shell
16:45
Editing our installer YAML to point to our reverse shell
19:30
Putting the files on the share and getting our reverse shell
21:30
Exploring the box to find PortableKanban
22:30
Copying the config to our box so we can extract the database password
25:40
Using CyberChef to decrypt the Portable Kanban password
28:20
Authenticating to Redit-CLI and dumping the user information to get administra
30:30
Using rundll32 to create a memory dump of LSASS so we can extract a password
32:30
Downloading lsass.dmp with evil-winrm
35:30
Using Pypykatz to parse the dump file and get Jason's password
38:30
Building our environment to perform CVE-2021-1675 (PrintNightmare)
42:50
Using PrintNightmare to connect to our netcat to verify it is vulnerable
44:20
Building a DLL to send a reverse shell
46:50
Having trouble with Impacket's SMBServer, configuring our local SMBD to work w
49:20
Reading more errors from impacket to verify we do have code execution
50:10
Giving a file that doesn't exist to see another error... More verifying that t
51:20
Giving it our ReverseShell DLL to get a reverse shell
🎓
Tutor Explanation
DeepCamp AI