HackTheBox - Monitored

Поділитися
Вставка
  • Опубліковано 17 чер 2024
  • 00:00 - Introduction
    01:00 - Start of nmap
    02:40 - Examining the webpage, not finding much
    05:30 - Checking out SNMP, discovering its open with the default community string. Installing MIBS so we can make sense of the data
    08:20 - The process list is in SNMP, explaining how to read this data
    12:40 - Grepping interesting processes discovering there's a bash script that has user credentials in arguments! Attempting to log into Nagios with it
    14:00 - The SVC Account couldn't log in on the GUI, Looking for how to login via an API
    15:45 - Logging into Nagios, discovering it is version 5.11.0 which is vulnerable to a SQL Injection
    17:40 - Manually exploiting this Error Based SQL Injection with XPATH
    26:45 - Using Burpsuite Intruder to dump the TABLES, then edit the columns in burpsuite to show tables easily
    33:40 - The APIKEY is too long to display, using SUBSTRING to grab the APIKEY in multiple requests
    35:45 - Finding a way to register a new user with our API KEY and make them an administrator
    39:00 - Creating a Nagios Check to send us a shell
    41:20 - Showing how to perform the SQL Injection through SQLMap
    49:00 - Finding the MySQL Password of Nagios
    51:00 - Discovering the Nagios user has a bunch of sudo rules
    57:00 - (Root method 1) Exploiting GetProfile through creating a SymLink
    59:00 - (Root method 2) Overwriting the Nagios Binary than using Sudo to restart the service to get a root shell

КОМЕНТАРІ • 32

  • @MusicDimensionYoutube
    @MusicDimensionYoutube Місяць тому +9

    I can't imagine no more a Saturday without your videos ❤❤

  • @angeleeh
    @angeleeh Місяць тому +13

    'we are not known for taking notes here' - Ippsec, 2024

  • @NatteeSetobol
    @NatteeSetobol Місяць тому +1

    Just wanted to say that doing it 'manually' helps me learn! Thanks for deciding to it manually!

  • @h8handles
    @h8handles Місяць тому +2

    As someone preparing for OSCP in less than 2 weeks my heart was full when you said lets just do it manually. Thank you ❤

    • @traderH
      @traderH Місяць тому

      Man this is so hard 😢😢😢 did you do the challenege labs ?

    • @h8handles
      @h8handles Місяць тому

      I've been signed up for longer but yeah some of them. @@traderH

  • @respectclips5185
    @respectclips5185 Місяць тому +1

    Always love your videos, well explained❤️❤, love from Bharat🇮🇳❤❤

  • @zoes17
    @zoes17 Місяць тому +7

    45:58 there's a `-hh` for a more verbose help on sqlmap. That likely hides your `--force-ssl` flag.

  • @olivernichols7493
    @olivernichols7493 25 днів тому

    Great video, enjoyed the manual sql exploit.
    I imagine if we are careful enough and did our homework, we could add a reverse shell to the nagios functionally (run nagios then reverse shell, etc.)

  • @nomercy7101
    @nomercy7101 26 днів тому

    I am korea vig fan of your. Thank you always

  • @sotecluxan4221
    @sotecluxan4221 Місяць тому

    Thanx!

  • @tg7943
    @tg7943 Місяць тому

    Push!

  • @apkanalyze3623
    @apkanalyze3623 Місяць тому

    51:15 I feel like this all the time :):)

  • @Eskimostyle
    @Eskimostyle Місяць тому

    What is your device setup like @IppSec? Is it like bare metal ubuntu and all the security stuff you do is on VM's or some other kind of setup? Thank you in advance!

    • @sponge5643
      @sponge5643 Місяць тому

      Parrot OS HTB VM

    • @Eskimostyle
      @Eskimostyle Місяць тому

      @@sponge5643 Sorrry but that was not the question lol. I know he uses Parrot OS HTB. But the question was is it in VM or not, and if it was in VM, what does he use as his main OS and does he use all his cybersec 'tools' as VM's only or what is his setup like

    • @megaREAL900
      @megaREAL900 Місяць тому +2

      @@Eskimostyle IIRC he uses VMs for everything, in some windows videos where he'll switch to a windows VM you can see he uses VMWare and has the parrot VM there alongside the windows one

    • @Eskimostyle
      @Eskimostyle Місяць тому

      @@megaREAL900 do you know his main OS?

    • @megaREAL900
      @megaREAL900 Місяць тому

      @@Eskimostyle no clue

  • @sand3epyadav
    @sand3epyadav Місяць тому

    You can add --top-ports 10 is much faster than normal udp scan

    • @olivernichols7493
      @olivernichols7493 Місяць тому

      Very true but you are only scanning the top 10 ports rather than the top 1,000.
      I’ve seen ipp use the min-rate option to speed it up too (can be more unreliable)

    • @sand3epyadav
      @sand3epyadav Місяць тому

      ​@@olivernichols7493 i am talking about udp scan not tcp

  • @jaankerino8748
    @jaankerino8748 Місяць тому

    How are you executing sudo -l without being prompted to put in the password?
    zero and one, like that

  • @edoardottt
    @edoardottt Місяць тому +1

    I'm not understanding why you've used SNMP but nmap didn't show it 😮

    • @ippsec
      @ippsec  Місяць тому +2

      Snmp is UDP, not TCP. Default nmap only shows tcp

    • @edoardottt
      @edoardottt Місяць тому +2

      @@ippsec aaah you're right, I missed that. thanks so much!

  • @AUBCodeII
    @AUBCodeII Місяць тому

    25 cents, Ipp

  • @APTsec
    @APTsec Місяць тому

    first!