HackTheBox - Patents

IppSec · Beginner ·📰 AI News & Updates ·5y ago
00:00 - Intro 01:00 - Begin of nmap, there's a weird 8888 port. 03:55 - Looking at the website, downloading a docx 06:30 - Finally running GoBuster, doing the raft wordlist because it has "UpdateDetails" 15:15 - Running GoBuster against the "release" directory to get release notes and researching XML and DocX 22:00 - Adding an XXE Payload into our Word Document: customXml/item1.xml 26:15 - Making an XXE Chain to extract files using HTTP and PHP's Encoder 33:20 - Extracting the Apache Config to see DocRoot, then extracting config.php 37:40 - Exploring LFI Injection into getPatent_alphav1.0.php, explaining what happens with bad regex to remove things. 42:10 - Exploring Log File Poisoning 54:00 - Shell returned on the box, fixing up the TTY and searching for files by creation time 58:30 - There's a file in /opt/, that hints at a cronjob running a task every minute. Running PSPY to see the process creation 01:01:40 - Password is exposed in the command, this is the root password to the docker. Exploring the Cron and /opt/lfm directory 01:11:25 - Exploring the lfm directory and examining old git commit's to get the binary of lfmserver and some old source code. 1:15:00 - Opening up on Ghidra, defining main 1:17:20 - Going into the first piece of the program which looks like an argument check. Looking at the source to verify we are correct. 1:20:30 - Searching for the password in the binary to see where it is used. Use GDB to help us understand what is happening 1:24:30 - Start of creating an exploit script 1:29:50 - Changing the password to ippsec, and looking at it in GDB to confirm a variable... Bunch more playing around learning the binary 1:44:10 - Discover the applicaiton is expecting files to be in /files/, behaves like DOC_ROOT 1:45:10 - Explaining where I think the Buffer Overflow Happens (URLDecode) 1:50:00 - Crashed the applicaiton, discovering the correct spot to overwrite with "pattern create" 1:54:00 - Using Ropper to find some pop gadgets to use, then cre
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Playlist

Uploads from IppSec · IppSec · 0 of 60

← Previous Next →
1 HHC2016 - Analytics
HHC2016 - Analytics
IppSec
2 HackTheBox - October
HackTheBox - October
IppSec
3 HackTheBox - Arctic
HackTheBox - Arctic
IppSec
4 HackTheBox - Brainfuck
HackTheBox - Brainfuck
IppSec
5 HackTheBox - Bank
HackTheBox - Bank
IppSec
6 HackTheBox - Joker
HackTheBox - Joker
IppSec
7 HackTheBox - Lazy
HackTheBox - Lazy
IppSec
8 Camp CTF 2015 - Bitterman
Camp CTF 2015 - Bitterman
IppSec
9 HackTheBox - Devel
HackTheBox - Devel
IppSec
10 Reversing Malicious Office Document (Macro) Emotet(?)
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
11 HackTheBox - Granny and Grandpa
HackTheBox - Granny and Grandpa
IppSec
12 HackTheBox - Pivoting Update: Granny and Grandpa
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
13 HackTheBox - Optimum
HackTheBox - Optimum
IppSec
14 HackTheBox - Charon
HackTheBox - Charon
IppSec
15 HackTheBox - Sneaky
HackTheBox - Sneaky
IppSec
16 HackTheBox - Holiday
HackTheBox - Holiday
IppSec
17 HackTheBox - Europa
HackTheBox - Europa
IppSec
18 Introduction to tmux
Introduction to tmux
IppSec
19 HackTheBox - Blocky
HackTheBox - Blocky
IppSec
20 HackTheBox - Nineveh
HackTheBox - Nineveh
IppSec
21 HackTheBox - Jail
HackTheBox - Jail
IppSec
22 HackTheBox - Blue
HackTheBox - Blue
IppSec
23 HackTheBox - Calamity
HackTheBox - Calamity
IppSec
24 HackTheBox - Shrek
HackTheBox - Shrek
IppSec
25 HackTheBox - Mirai
HackTheBox - Mirai
IppSec
26 HackTheBox - Shocker
HackTheBox - Shocker
IppSec
27 HackTheBox - Mantis
HackTheBox - Mantis
IppSec
28 HackTheBox - Node
HackTheBox - Node
IppSec
29 HackTheBox - Kotarak
HackTheBox - Kotarak
IppSec
30 HackTheBox - Enterprise
HackTheBox - Enterprise
IppSec
31 HackTheBox - Sense
HackTheBox - Sense
IppSec
32 HackTheBox - Minion
HackTheBox - Minion
IppSec
33 VulnHub - Sokar
VulnHub - Sokar
IppSec
34 VulnHub - Pinkys Palace v2
VulnHub - Pinkys Palace v2
IppSec
35 HackTheBox - Inception
HackTheBox - Inception
IppSec
36 Vulnhub - Trollcave 1.2
Vulnhub - Trollcave 1.2
IppSec
37 HackTheBox - Ariekei
HackTheBox - Ariekei
IppSec
38 HackTheBox - Flux Capacitor
HackTheBox - Flux Capacitor
IppSec
39 HackTheBox - Jeeves
HackTheBox - Jeeves
IppSec
40 HackTheBox - Tally
HackTheBox - Tally
IppSec
41 HackTheBox - CrimeStoppers
HackTheBox - CrimeStoppers
IppSec
42 HackTheBox - Fulcrum
HackTheBox - Fulcrum
IppSec
43 HackTheBox - Chatterbox
HackTheBox - Chatterbox
IppSec
44 HackTheBox - Falafel
HackTheBox - Falafel
IppSec
45 How To Create Empire Modules
How To Create Empire Modules
IppSec
46 HackTheBox - Nightmare
HackTheBox - Nightmare
IppSec
47 HackTheBox - Nightmarev2  - Speed Run/Unintended Solutions
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
48 HackTheBox - Bart
HackTheBox - Bart
IppSec
49 HackTheBox -  Aragog
HackTheBox - Aragog
IppSec
50 HackTheBox - Valentine
HackTheBox - Valentine
IppSec
51 HackTheBox - Silo
HackTheBox - Silo
IppSec
52 HackTheBox - Rabbit
HackTheBox - Rabbit
IppSec
53 HackTheBox - Celestial
HackTheBox - Celestial
IppSec
54 HackTheBox - Stratosphere
HackTheBox - Stratosphere
IppSec
55 HackTheBox - Poison
HackTheBox - Poison
IppSec
56 HackTheBox - Canape
HackTheBox - Canape
IppSec
57 HackTheBox - Olympus
HackTheBox - Olympus
IppSec
58 HackTheBox - Sunday
HackTheBox - Sunday
IppSec
59 HackTheBox - Fighter
HackTheBox - Fighter
IppSec
60 HackTheBox - Bounty
HackTheBox - Bounty
IppSec

Related AI Lessons

Chapters (23)

Intro
1:00 Begin of nmap, there's a weird 8888 port.
3:55 Looking at the website, downloading a docx
6:30 Finally running GoBuster, doing the raft wordlist because it has "UpdateDetail
15:15 Running GoBuster against the "release" directory to get release notes and rese
22:00 Adding an XXE Payload into our Word Document: customXml/item1.xml
26:15 Making an XXE Chain to extract files using HTTP and PHP's Encoder
33:20 Extracting the Apache Config to see DocRoot, then extracting config.php
37:40 Exploring LFI Injection into getPatent_alphav1.0.php, explaining what happens
42:10 Exploring Log File Poisoning
54:00 Shell returned on the box, fixing up the TTY and searching for files by creati
58:30 There's a file in /opt/, that hints at a cronjob running a task every minute.
1:01:40 Password is exposed in the command, this is the root password to the docker.
1:11:25 Exploring the lfm directory and examining old git commit's to get the binary o
1:15:00 Opening up on Ghidra, defining main
1:17:20 Going into the first piece of the program which looks like an argument check.
1:20:30 Searching for the password in the binary to see where it is used. Use GDB to
1:24:30 Start of creating an exploit script
1:29:50 Changing the password to ippsec, and looking at it in GDB to confirm a variabl
1:44:10 Discover the applicaiton is expecting files to be in /files/, behaves like DOC
1:45:10 Explaining where I think the Buffer Overflow Happens (URLDecode)
1:50:00 Crashed the applicaiton, discovering the correct spot to overwrite with "patte
1:54:00 Using Ropper to find some pop gadgets to use, then cre
Up next
Software is not a moat
Lenny's Podcast
Watch →