HackTheBox - Helpline
00:35 - Begin of Recon
01:42 - Checking the ManageEngine Page
02:23 - Running Searchsploit to see potential exploits
03:40 - Enumerating valid usernames via AjaxDomainServlet
05:40 - Logging in with guest:guest
07:10 - Running the privilege escalation script to get Administrator access
08:00 - Searching for information on this exploit
08:20 - Blog post missing... Searching Archive.org and Google Cache for a mirror
10:00 - Making curl go through burp to step through the exploit in BurpSuite
18:00 - Copying the admin cookies into FireFox
19:25 - Going to Admin then Custom Triggers to execute code on the server
21:50 - Getting a reverse shell via Nishang
22:30 - Using iconv to create UTF-16LE encoded Base64 for use with "-EncodedCommand" option
25:45 - Reverse Shell as System returned, but EFS Protects the flags
26:45 - Finding interesting files with get-childitem -recurse . | select FullName
28:50 - Copying mimikatz over to the box to steal NTLM Hashes
31:00 - Defender blocked us. Disable defender with Set-MpPreference -DisableRealtimeMonitoring $true
32:50 - Using hashes.org to view password of Zachary, checking his groups to see he can view event logs
33:30 - Doing some powershell goodness to search event logs!
40:50 - Extracting ProcessCommandLine from the logs (Tolu Password), its a shame Nishang screws with how some commands output to stdout. This could of been a lot cleaner.
43:00 - Using Mimikatz to decrypt the EFS Protected file with Tolu's password
57:25 - Need to read Leo's admin-pass.xml, load meterpreter and migrate into his namespace
01:00:20 - admin-pass is the output of SecureString, lets decrypt it to get the admin password
01:02:20 - Using Invoke-Command with the credential object created to execute commands as administrator
01:03:50 - Cannot read root.txt because of "Double Hop Problem" (how PowerShell Authenticates), using CredSSP Authentication to fix this.
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
The era of the Indian H-1B programmer is over. US graduates will take their place.
Medium · AI
Most People Use AI Wrong. Here’s the System That Actually Works
Medium · AI
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
Chapters (25)
0:35
Begin of Recon
1:42
Checking the ManageEngine Page
2:23
Running Searchsploit to see potential exploits
3:40
Enumerating valid usernames via AjaxDomainServlet
5:40
Logging in with guest:guest
7:10
Running the privilege escalation script to get Administrator access
8:00
Searching for information on this exploit
8:20
Blog post missing... Searching Archive.org and Google Cache for a mirror
10:00
Making curl go through burp to step through the exploit in BurpSuite
18:00
Copying the admin cookies into FireFox
19:25
Going to Admin then Custom Triggers to execute code on the server
21:50
Getting a reverse shell via Nishang
22:30
Using iconv to create UTF-16LE encoded Base64 for use with "-EncodedCommand" o
25:45
Reverse Shell as System returned, but EFS Protects the flags
26:45
Finding interesting files with get-childitem -recurse . | select FullName
28:50
Copying mimikatz over to the box to steal NTLM Hashes
31:00
Defender blocked us. Disable defender with Set-MpPreference -DisableRealtimeM
32:50
Using hashes.org to view password of Zachary, checking his groups to see he ca
33:30
Doing some powershell goodness to search event logs!
40:50
Extracting ProcessCommandLine from the logs (Tolu Password), its a shame Nisha
43:00
Using Mimikatz to decrypt the EFS Protected file with Tolu's password
57:25
Need to read Leo's admin-pass.xml, load meterpreter and migrate into his names
1:00:20
admin-pass is the output of SecureString, lets decrypt it to get the admin pas
1:02:20
Using Invoke-Command with the credential object created to execute commands as
1:03:50
Cannot read root.txt because of "Double Hop Problem" (how PowerShell Authentic
🎓
Tutor Explanation
DeepCamp AI