Posts

Showing posts with the label Education

Explore HTB - Walkthrough

Image
Hey peeps Styx here, This is a quick write-up on the Explore box. The box is rated as easy. But this is also the first android challange!   ____________________________________________________________________________________  # RECON # OS = Android  version =  4.9.214-android-x86_64-g04f9324  ____________________________________________________________________________________  ## PORTS ##  3 ports open  2222 tcp SSH-2.0-SSH Server - Banana Studio  44491 tcp  42135/tcp open http ES File Explorer Name Response httpd  59777 http Bukkit JSONAPI httpd for Minecraft game server 3.6.0 or older  ____________________________________________________________________________________  #EXPLOITATION# The ES File Explorer service seems to have and arbitrary file read vulnerability. Link can be found  -- > here    run python3 exploit.py listPics 10.10.10.247  We can see a couple of pics in that di...

Explore HTB - Walkthrough

Image
Hey peeps Styx here, This is a quick write-up on the Explore box. The box is rated as easy. But this is also the first android challange!   ____________________________________________________________________________________  # RECON # OS = Android  version =  4.9.214-android-x86_64-g04f9324  ____________________________________________________________________________________  ## PORTS ##  3 ports open  2222 tcp SSH-2.0-SSH Server - Banana Studio  44491 tcp  42135/tcp open http ES File Explorer Name Response httpd  59777 http Bukkit JSONAPI httpd for Minecraft game server 3.6.0 or older  ____________________________________________________________________________________  #EXPLOITATION# The ES File Explorer service seems to have and arbitrary file read vulnerability. Link can be found  -- > here    run python3 exploit.py listPics 10.10.10.247  We can see a couple of pics in that di...

Cap HTB Walkthrough

Image
Hi Ya'll. This is going to be a quick walkthrough of the Cap Box. This box is rated as easy. Let's Get into it!   # Recon #   Let's start off by kicking off a quick nmap. By looking at the results below we can see that our target has 3 ports open.    _____________________________________________________________________________________ ## PORTS ## 21/tcp open ftp vsftpd 3.0.3 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.2 (Ubuntu Linux; protocol 2.0) 80/tcp open http gunicorn _____________________________________________________________________________________ ## Content Discovery ## Let's start by running dirsearch to see what we can find on this port. As you can see in the picture above. we found the path /data/2. This allows us to download a pcap file. This allows us to analyse the traffic and look for information we can use to further attack this box.  Looking at all of the pcap files available on this application, we come across t...

Seal HTB Walkthrough

Image
Hey dudes and dudettes. In this post we'll be walking through the Seal Box. This box is rated as medium.  ## RECON ## Let's start with a quick nmap and see what ports and services are open.  ____________________________________________________________________________________ PORT     STATE SERVICE    REASON  VERSION 22/tcp   open  ssh        syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.2 (Ubuntu Linux; protocol 2.0) | ssh-hostkey:  |   3072 4b:89:47:39:67:3d:07:31:5e:3f:4c:27:41:1f:f9:67 (RSA) | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC1FohcrXkoPYUOtmzAh5PlCU2H0+sFcGl6XXS6vX2lLJ3RD2Vd+KlcYtc2wQLjcYJhkFe793jmkogOSh0uI+fKQA9z1Ib3J0vtsIaNkXxvSMPcr54QxXgg1guaM1OQl43ePUADXnB6WqAg8QyF6Nxoa18vboOAu3a8Wn9Qf9iCpoU93d5zQj+FsBKVaDs3zuJkUBRfjsqq7rEMpxqCfkFIeUrJF9MBsQhgsEVUbo1zicWG32m49PgDbKr9yE3lPsV9K4b9ugNQ3zwWW5a1OpOs+r3AxFcu2q65N2znV3/p41ul9+fWXo9pm0jJPJ3V5gZphDkXVZEw16K2hcgQcQJUH7luaVTRpzqDxXaiK/8wChtMXEUjFQKL6sn...

Love HTB Walkthrough

Image
    Hey guys Styx here. Back again with another HTB walkthrough. This time we go through the Love box which is rated as easy. ## RECON ##   as usual add love.htb to the /etc/hosts file. Let's kick off off a quick rust scan.  We quickly see that there are 19 ports open. Let's look at further results. Looking at the scan results we see staging.love.htb. Let's add this to our host file. Ok let's move on to content discovery.  When enumerating the target we see that we got a hit on /admin let's browse to this location.  In this pic  here we can see that we found an admin panel. No further results were found that we can use to dig deeper in the application. So let's look back at the nmap results. Let's take a look at staging.love.htb. And on staging.love.htb we found the file scanner. Let's see if we can scan some of the local ports using this file scanner. after trying a few ports that also used HTTP (as shown in the nmap results). Eventually,by scanning 1...

Knife HTB Walkthrough

Image
Hey guys Styx here. Back after a break. It's time to get back at it. This time I have a HTB walk-through of the Knife box. Let's get into it.   ## RECON ##   Before we do anything Let's add the IP to our /etc/hosts file  Now let's kick off our recon.  Rustscan show's 2 ports open.  port 22 which is SSH and port 80 which is HTTP. Well let's look at what technology is running on the server. Using the Wappalyzer plugin, we see that this web app is running on PHP 8.1.0. Let's Give it a quick google and we quickly find this exploit HERE Blog about this cool find over here --> HERE   An early release of PHP, the PHP 8.1.0-dev version was released with a backdoor on March 28th 2021, but the backdoor was quickly discovered and removed. If this version of PHP runs on a server, an attacker can execute arbitrary code by sending the User-Agentt header. ## Initial Foothold ##  Now that we have found a good lead. Let's try and gain our ini...

Popular posts from this blog

Explore HTB - Walkthrough

Schooled HTB -Writeup

Seal HTB Walkthrough