HackTheBox - Aragog

Поділитися
Вставка
  • Опубліковано 1 гру 2024

КОМЕНТАРІ • 27

  • @mistercyber1848
    @mistercyber1848 2 роки тому +1

    I am very grateful for all your videos. Thank you for teaching us😊

  • @hamzakhiate1767
    @hamzakhiate1767 6 років тому

    Thanks , i'm learning new things every time i watch a WT ^^

  • @ejnixon
    @ejnixon 6 років тому +5

    I like the Python script to get all the contents of directories. I manually did it in burp lol. If there was a lot more content a script like this would have sped things up quite a bit. Thanks!

    • @gusralph2215
      @gusralph2215 6 років тому

      Yeah, I manually checked aswell, although the RSA key was the second thing I tried so I got it pretty quick. Great box.

  • @automata8973
    @automata8973 6 років тому +1

    Oh god. You make it look so easy.

  • @IS33UUU
    @IS33UUU 5 років тому

    You're a majician! Can't thank you enough.

  • @GuiltySpark
    @GuiltySpark 6 років тому

    Feeling the Trap Card Spider Icon

  • @AlienTheProbeWare
    @AlienTheProbeWare 6 років тому

    Why does mine show “host seems down.if it is really up, but blocking pung probed, try -Pn” and it doesn’t display all that

  • @nenaddinic9326
    @nenaddinic9326 6 років тому

    Hi ippsec,
    I have a question not related to this box. Is there a way to bypass false positives when url bruteforcing. When I try gobuster I get Wildcard response found, using of the -fw switch does not help
    Edit: Watched your node video, did not helped me, also burp spider did not get me anything

    • @hokkaido8611
      @hokkaido8611 6 років тому

      Try with wfuzz using --hc, --hw params, it depends of the false positive

  • @aceMunim
    @aceMunim 6 років тому

    hi, btw may i know which repo u found that linux file list coz i been looking for it to keep it but wasnt able to, seen some linux files with 8k lines but mostly rubbish. and also how did you know that you would need to do an xxe attack on this box right of the bat? do u have some technique for it or u've just fuzzed it through your intruder which is faster?
    thanx and more power to ya!!!

    • @ippsec
      @ippsec  6 років тому +1

      The file on the ftp server is a big hint. Web server is a subnet calculator with no input, and that text file is xml subnet stuff

    • @aceMunim
      @aceMunim 6 років тому

      it went out of my mind that you did download the file via ftp first so needed to watch it again. thanx :)

  • @baciukrystyan6479
    @baciukrystyan6479 6 років тому

    Thank you!

  • @jwouter
    @jwouter 6 років тому

    Good one , didn’t write a script immediately went for the id_rsa , I spent way to much time on the database 😥 never though of changing the logon page ........

  • @zephyfoxy
    @zephyfoxy 6 років тому +1

    This makes my head spin. Makes me worry just how far I can get in HTB with my current skillset. Makes me wonder if I need more classes, but I'd spend a lifetime in training if I went that route.

  • @SuperMarkusparkus
    @SuperMarkusparkus 6 років тому +1

    If I recall correctly, I think I solved this box without backdooring the login. As www-data I renamed /var/www/html/zz_backup and then created a symlink called zz_backup pointing to /root. root user would then run the backups script every 5 minutes, and it copies /var/www/html/zz_backup (now pointing to /root or whatever) to /var/www/html/dev_wiki, make cliff finally chmod 777, basically sharing all his files.

  • @luv2stack
    @luv2stack 6 років тому

    God damn you are fast

  • @0x4bdullah
    @0x4bdullah 6 років тому

    I wonder why you specify gobuster full path everytime you run it, why not just doing gobuster without the path?, it works just fine.
    Thank you for the great content, keep 'em coming :)

    • @ippsec
      @ippsec  6 років тому

      When I first started using gobuster it wasn’t in Kali repo, so i left it like that to let people know I manually compiled it. Someone recently pointed out it was in the repo now so I will probably switch

    • @0x4bdullah
      @0x4bdullah 6 років тому

      I see, it is actually more efficient to use it directly IMHO. Thank you for the clarification :)

  • @georgeo1316
    @georgeo1316 6 років тому

    You can skip out masses from this by looking for ssh keys straight away through the XXE file retrieval method for the first part.

    • @ippsec
      @ippsec  6 років тому +2

      Sure but your missing out on learning ways to enumerate. Going from LFI to a file in a users directory isn’t exactly something I’d try manually since it’s relatively rare. Two permissions and I believe a config file have to be dorked up

  • @mehh5505
    @mehh5505 6 років тому +1

    18:49 that didn't work because you created a function called getfile and assigned the variable inside it but you directly used the print command without executing the function. It would have worked if you typed something like print getfile('/etc/passwd')
    Cheers
    Ps: i saw later that u solved it

  • @ahmedn00blife50
    @ahmedn00blife50 6 років тому

    Hey ipp, can u do a video about your setup, how you make videos and what if any equipment u use. Thanks.

  • @infectedburrito
    @infectedburrito 6 років тому

    First!