HackTheBox - Resource
00:00 - Introduction
01:00 - Start of nmap
06:55 - Discovering LFI in the page parameter but we cannot immediately exploit it
10:00 - Discovering admin and playing with ping, deciding its not vulnerable and moving on
15:06 - Uploading a zip file to the ticket, then using the phar wrapper with our LFI to include it
19:50 - Shell returned on the box, python doesn't exist using script to fix our tty
23:00 - Editing our session file on the box, so we can change users without having to change the database
27:50 - Obtaining the HAR File from a ticket, showing Google's web app that visualizes the file
31:50 - Examining the HAR File from command line, which I think is easier
36:30 - Discovering old SSH CA Files in msainristil's directory, checking the SSH Config to see it has TrustedUserCaKeys which lets this CA Sign Public Keys
38:50 - Using SSH-Keygen to sign a public key with a CA specifying root as the principal then logging in
43:00 - Discovering a bash script which uses a web API to sign certificates with another CA, creating a ticket that lets us on as support
45:55 - The host server has AuthorizedPrincipalsFile configured, explaining how this works with TrustedUserCAKeys and ssh
50:00 - Logging in as ZZINTER and discovering they can run a bash script as sudo, which has a File Disclosure vulnerability due to lack of quotes around a comparison
51:40 - Explaining how this works, by doing a couple characters manually
57:50 - Creating a program in golang to dump the CA File
1:09:15 - Running the program, grabbing the CA then creating a root key
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Tool Use & Function Calling
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
Nvidia Just Gave Quantum Computers a New Brain
Medium · AI
The Edge AI Cannot Reproduce
Medium · LLM
Chapters (17)
Introduction
1:00
Start of nmap
6:55
Discovering LFI in the page parameter but we cannot immediately exploit it
10:00
Discovering admin and playing with ping, deciding its not vulnerable and movin
15:06
Uploading a zip file to the ticket, then using the phar wrapper with our LFI t
19:50
Shell returned on the box, python doesn't exist using script to fix our tty
23:00
Editing our session file on the box, so we can change users without having to
27:50
Obtaining the HAR File from a ticket, showing Google's web app that visualizes
31:50
Examining the HAR File from command line, which I think is easier
36:30
Discovering old SSH CA Files in msainristil's directory, checking the SSH Conf
38:50
Using SSH-Keygen to sign a public key with a CA specifying root as the princip
43:00
Discovering a bash script which uses a web API to sign certificates with anoth
45:55
The host server has AuthorizedPrincipalsFile configured, explaining how this w
50:00
Logging in as ZZINTER and discovering they can run a bash script as sudo, whic
51:40
Explaining how this works, by doing a couple characters manually
57:50
Creating a program in golang to dump the CA File
1:09:15
Running the program, grabbing the CA then creating a root key
🎓
Tutor Explanation
DeepCamp AI