HackTheBox - Passage
00:00 - Intro
01:10 - Start of nmap
02:10 - Identifying this is likely Ubuntu Xenial
03:30 - Attempting basic SQL Map
05:20 - Failing to find a way to enumerate CuteNews version
06:55 - Looking over an exploit script from SearchSploit
08:15 - Finding there is a page that exposes a bunch of user hashes... wat?
10:20 - Copying a bunch of PHP Blobs, then using grep to only show us the hashes
11:50 - Going back to looking over the exploit script
14:00 - Sent the exploit script through burpsuite and looking at each request
15:45 - Getting a reverse shell and fixing out TTY
19:00 - Searching CuteNews PHP Files for passwords
20:35 - Decoding the php files within the users directory to get password hashes
20:50 - Writing a nasty bash one liner to go over all the files and output the base64, then use grep to only show what we want to get hashes
23:00 - Using Hash Identifier to get an idea what the hash is, then using CrackStation to quickly crack
26:15 - The Cred we decrypted was for John, using SU to switch to the john user
27:00 - Oddly enough the SSH Public key is John's directly wasn't generated by him... Validating that is the public key to the private key
30:00 - Using Nadav's key to SSH into the box
31:48 - Exploring VIMINFO to see some forensics on what this user has done
34:14 - Looking for USBCreator Privesc's
37:00 - Running the GDBus command to copy files and get root.
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
The era of the Indian H-1B programmer is over. US graduates will take their place.
Medium · AI
Most People Use AI Wrong. Here’s the System That Actually Works
Medium · AI
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
Chapters (21)
Intro
1:10
Start of nmap
2:10
Identifying this is likely Ubuntu Xenial
3:30
Attempting basic SQL Map
5:20
Failing to find a way to enumerate CuteNews version
6:55
Looking over an exploit script from SearchSploit
8:15
Finding there is a page that exposes a bunch of user hashes... wat?
10:20
Copying a bunch of PHP Blobs, then using grep to only show us the hashes
11:50
Going back to looking over the exploit script
14:00
Sent the exploit script through burpsuite and looking at each request
15:45
Getting a reverse shell and fixing out TTY
19:00
Searching CuteNews PHP Files for passwords
20:35
Decoding the php files within the users directory to get password hashes
20:50
Writing a nasty bash one liner to go over all the files and output the base64,
23:00
Using Hash Identifier to get an idea what the hash is, then using CrackStation
26:15
The Cred we decrypted was for John, using SU to switch to the john user
27:00
Oddly enough the SSH Public key is John's directly wasn't generated by him...
30:00
Using Nadav's key to SSH into the box
31:48
Exploring VIMINFO to see some forensics on what this user has done
34:14
Looking for USBCreator Privesc's
37:00
Running the GDBus command to copy files and get root.
🎓
Tutor Explanation
DeepCamp AI