HackTheBox - Devzat
00:00 - Intro
01:15 - Start of nmap
03:00 - Poking at the SSH Chat Application
05:10 - Running a VHOST Scan and discovering pets.devzat.htb
08:30 - Discovering pets.devzat.htb doesn't have a 404 and is a golang webserver
10:55 - Fuzzing the user input on pets
14:10 - Webapp ignores when a semicolon is at the end of user input, indication to command injection [MasterRecon]
16:20 - Using Gobuster to discover the .git directory and working around the issue of the box having no 404 errors. Use git-dumper to extract.
19:00 - Doing some light source code analysis on the Go Binary
23:15 - Showing it is also an LFI Vulnerability, just incase command injection was patched
29:00 - Reverse shell returned, examining the git log of the files, don't see anything interesting
30:50 - Discovering from localhost we can login to chat as anyone, but messages are hidden on Reverse Shells. Switch to SSH and read the messages.
36:40 - Looking for an InfluxDB vulnerability via exploit-db, changelog, and synk
39:40 - Going to git, and pulling up the issue created for this issue so we can understand how to exploit it
41:30 - Using JWT.IO to create a token with a blank signature
45:20 - Testing our authentication bypass with curl, then creating a bash script to make it a bit easier for us to run queries.
47:00 - Using the HTTP API of InfluxDB to show databses, tables, and dump data to get catherines password
53:20 - Using the find command to find files owned by catherine, to find a backup of the dev source code
55:40 - Finding all the files that differ between two directories via find, md5sum, and grep
59:00 - Discovering the hard coded password required for the FILE command in the new devzat application
1:00:40 - Grabbing roots SSH Key via an LFI in the FILE Command
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
Pony.ai Unveils NVIDIA-Powered Domain Controller for L4 Autonomy
Dev.to AI
Your LLM budget alerts won't save you if you can't map costs to users
Dev.to · John Medina
A System-Prompt Skeleton That Survives Claude/GPT/Gemini Swaps
Dev.to · Gabriel Anhaia
Wire OpenTelemetry Around Your Anthropic Python Calls
Dev.to · Gabriel Anhaia
Chapters (21)
Intro
1:15
Start of nmap
3:00
Poking at the SSH Chat Application
5:10
Running a VHOST Scan and discovering pets.devzat.htb
8:30
Discovering pets.devzat.htb doesn't have a 404 and is a golang webserver
10:55
Fuzzing the user input on pets
14:10
Webapp ignores when a semicolon is at the end of user input, indication to com
16:20
Using Gobuster to discover the .git directory and working around the issue of
19:00
Doing some light source code analysis on the Go Binary
23:15
Showing it is also an LFI Vulnerability, just incase command injection was pat
29:00
Reverse shell returned, examining the git log of the files, don't see anything
30:50
Discovering from localhost we can login to chat as anyone, but messages are hi
36:40
Looking for an InfluxDB vulnerability via exploit-db, changelog, and synk
39:40
Going to git, and pulling up the issue created for this issue so we can unders
41:30
Using JWT.IO to create a token with a blank signature
45:20
Testing our authentication bypass with curl, then creating a bash script to ma
47:00
Using the HTTP API of InfluxDB to show databses, tables, and dump data to get
53:20
Using the find command to find files owned by catherine, to find a backup of t
55:40
Finding all the files that differ between two directories via find, md5sum, an
59:00
Discovering the hard coded password required for the FILE command in the new d
1:00:40
Grabbing roots SSH Key via an LFI in the FILE Command
🎓
Tutor Explanation
DeepCamp AI