UHC - BackendTwo
00:00 - Intro
00:49 - Start of nmap
02:17 - Talking about why dirbusting an API is different. Bruteforce methods instead of extensions and 404 doesn't terminate recursion
03:10 - Installing the latest version of FeroxBuster
04:40 - Running FeroxBuster with Force Recursion and multiple HTTP methods to discover user endpoints
06:45 - Downloading all users, creating a single json file, then using JQ to enable us to filter users
10:08 - Registering an account via the Signup endpoint. Analyzing errors to identify how it wants data
11:55 - Logging into the application in order to get a bearer token
13:08 - Using BurpSuite to add the Bearer Token to our HTTP Request and accessing /docs/
15:10 - Playing with the edit endpoint in the docs page
16:38 - Testing for Mass Assignment, by editing our profile but adding the is_superuser parameter
19:15 - Using the file endpoint to extract files from the application
20:45 - Creating a bash script to make extracting files easier for us
23:45 - Using the LFI to examine the /proc/ directory to get cmdline of pid and ppid, along with environment variables
26:35 - Examining the LFI Source Code to identify how the application works and JWT is created
30:50 - Trying to write files, discovering we need to edit our JWT
32:45 - Creating a bash script that will update the webserver code to include another endpoint to send a reverse shell
41:50 - Reverse shell returned, reviewing the logs to identify a password was entered as a username
44:00 - Trying to use Sudo and getting to PAM-Wordle
45:05 - Analyzing timestamps on the filesystem with find to identify a PAM Module that was manually placed on the file system (not put there by APT)
48:25 - Running strings on the PAM Module, discovering the wordlist used for wordle is in a user-readable directory
49:00 - Using the wordlist to cheat wordle and root the box
50:10 - Examining the source code of the box to identify why it is vulnerable to the Mass Assignment
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
Related AI Lessons
⚡
⚡
⚡
⚡
I trained a LoRA adapter for $0.28
Medium · Machine Learning
Advanced Prompt Engineering for High-Impact AI Results
Medium · AI
Should You Use Prompt Engineering, Fine-Tuning, or RAG? A Practical Decision Guide
Medium · AI
Should You Use Prompt Engineering, Fine-Tuning, or RAG? A Practical Decision Guide
Medium · LLM
Chapters (23)
Intro
0:49
Start of nmap
2:17
Talking about why dirbusting an API is different. Bruteforce methods instead o
3:10
Installing the latest version of FeroxBuster
4:40
Running FeroxBuster with Force Recursion and multiple HTTP methods to discover
6:45
Downloading all users, creating a single json file, then using JQ to enable us
10:08
Registering an account via the Signup endpoint. Analyzing errors to identify h
11:55
Logging into the application in order to get a bearer token
13:08
Using BurpSuite to add the Bearer Token to our HTTP Request and accessing /doc
15:10
Playing with the edit endpoint in the docs page
16:38
Testing for Mass Assignment, by editing our profile but adding the is_superuse
19:15
Using the file endpoint to extract files from the application
20:45
Creating a bash script to make extracting files easier for us
23:45
Using the LFI to examine the /proc/ directory to get cmdline of pid and ppid,
26:35
Examining the LFI Source Code to identify how the application works and JWT is
30:50
Trying to write files, discovering we need to edit our JWT
32:45
Creating a bash script that will update the webserver code to include another
41:50
Reverse shell returned, reviewing the logs to identify a password was entered
44:00
Trying to use Sudo and getting to PAM-Wordle
45:05
Analyzing timestamps on the filesystem with find to identify a PAM Module that
48:25
Running strings on the PAM Module, discovering the wordlist used for wordle is
49:00
Using the wordlist to cheat wordle and root the box
50:10
Examining the source code of the box to identify why it is vulnerable to the M
🎓
Tutor Explanation
DeepCamp AI