HackTheBox - RainyDay
00:00 - Introduction
01:00 - Start of nmap
04:40 - Identifying this page is built with flask based upon a 404 page
06:15 - Looking at /api/
07:15 - Showing a weird bug in python where you cannot run int() on a string that is a float
08:00 - Showing the source code on why this bypassed the check
10:12 - End of edit, extracting all the users passwords with curl
15:40 - Cracking the hashes and getting a password of rubberducky, playing with creating containers
22:30 - Getting a reverse shell on the Alpine-Python container
24:00 - We are a privileged container and can see processes from root, which lets us access the hosts disk and CWD leaks file handles to directories. Grab an SSH Key
27:15 - Can execute safe_python with sudo as jack_adm but it turns out to be a sandbox, eventually find a use-after-free vuln on google and use that to escape
33:50 - Shell as Jack_adm, we can use sudo with hash_password.py, its a bcrypt hash but we can't crack what we create
35:40 - Explaining the vulnerability, bcrypt has a maximum length we can fill the buffer and prevent the python script from appending something to the password
43:40 - Creating a Hashcat rule file to append a single character to the password
45:50 - Creating a python script to exploit this vuln in bcrypt and leaking the secret key one character at a time
53:48 - Script to exploit the truncation vuln in bcrypt complete. Using hashcat to crack the password, showing two ways rule file and combinator attack which uses two dictionary files
1:00:00 - Finished the box but we skipped one step. Going back to show there was a dev subdomain which we need to pivot through a container to access
1:05:50 - The dev site has a different /api/healhtcheck page, we can use boolean logic with regex to perform a file disclosure vulnerability one char at a time
1:13:24 - Creating a python script to automate the file disclosure vulnerability and exporting files to leak extracting the cookie
1:30:10 - Talking about ways to improve the scrip
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
AI Is Doubling What It Can Do Every 7 Months
Medium · AI
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
The Man Behind DeepMind — Lessons you can Absorb to your Entrepreneurial Spirit.
Medium · AI
Chapters (20)
Introduction
1:00
Start of nmap
4:40
Identifying this page is built with flask based upon a 404 page
6:15
Looking at /api/
7:15
Showing a weird bug in python where you cannot run int() on a string that is a
8:00
Showing the source code on why this bypassed the check
10:12
End of edit, extracting all the users passwords with curl
15:40
Cracking the hashes and getting a password of rubberducky, playing with creati
22:30
Getting a reverse shell on the Alpine-Python container
24:00
We are a privileged container and can see processes from root, which lets us a
27:15
Can execute safe_python with sudo as jack_adm but it turns out to be a sandbox
33:50
Shell as Jack_adm, we can use sudo with hash_password.py, its a bcrypt hash bu
35:40
Explaining the vulnerability, bcrypt has a maximum length we can fill the buff
43:40
Creating a Hashcat rule file to append a single character to the password
45:50
Creating a python script to exploit this vuln in bcrypt and leaking the secret
53:48
Script to exploit the truncation vuln in bcrypt complete. Using hashcat to cr
1:00:00
Finished the box but we skipped one step. Going back to show there was a dev s
1:05:50
The dev site has a different /api/healhtcheck page, we can use boolean logic w
1:13:24
Creating a python script to automate the file disclosure vulnerability and exp
1:30:10
Talking about ways to improve the scrip
🎓
Tutor Explanation
DeepCamp AI