HackTheBox - Arctic

Поділитися
Вставка
  • Опубліковано 28 лис 2024

КОМЕНТАРІ • 105

  • @Lil_mar00
    @Lil_mar00 4 роки тому +2

    I used the directory traversal exploit, logged into CF dashboard as admin, setup a backdoor scheduler web shell, used the webshell to execute a meterpreter shell to get a standard user account. I wish i knew your burpsuite tactics before hand. Also the x64 suggester vs x86 suggester was something you just taught me which net me admin. Thank you!

    • @raymondken9177
      @raymondken9177 3 роки тому

      How did you login into the dashboard, did you use hydra, and if you did, how long did it take?

    • @pabloalfaro2595
      @pabloalfaro2595 2 роки тому

      @@raymondken9177 rpcdump shows a hash you can crack to get the coldfusion password

  • @dougthebugwrx
    @dougthebugwrx 5 років тому +2

    A brilliant well explained walk through . Explanation was clear and detailed and not rushed. Thank you sir

  • @n.w.aicecube5713
    @n.w.aicecube5713 2 роки тому

    God bless you Ippsec, have years I enjoy watching your videos

  • @hacfeast5061
    @hacfeast5061 3 роки тому

    This method didn't work for me but there is always something new to learn from your videos. Thanks for your efforts Ippsec! :)

  • @MrTalhaarshad
    @MrTalhaarshad 5 років тому +1

    This is really good, the techniques you are using is really easy completely understandable !
    Ippsec is really awsome !

  • @kushalrahatkar4568
    @kushalrahatkar4568 4 роки тому

    as always. awesome. the best CTF channel in the universe.

  • @nemanjaandjelic3980
    @nemanjaandjelic3980 6 років тому +1

    Thx ippsec, really enjoying the videos. Keep 'em coming

  • @leandroesteves9381
    @leandroesteves9381 5 років тому

    Incredible video!...i'm learning a lot. Thanks ippsec and keep up the good work.

  • @wa33ap
    @wa33ap 5 років тому

    You are the best! Thank you for all of u do.

  • @bugr33d0_hunter8
    @bugr33d0_hunter8 5 років тому +7

    Is there a way to do the box without using metasploit? I feel like a script kiddie when I use it. I also heard that it's not allowed on the oscp exam.

    • @ajaykumark107
      @ajaykumark107 3 роки тому +1

      you can use it for one time, and might want to save that for the most difficult box.

  • @JulioUreña
    @JulioUreña 7 років тому

    You are the BOSS!! Thanks for sharing!

  • @Fifa14Keygenteam
    @Fifa14Keygenteam 4 роки тому

    You're a GOD dude. Love your vids.

  • @paired7815
    @paired7815 5 років тому +3

    something has changed in metasploit? ...by setting 100 to httpclienttimeout i am getting a windows shell ... when i background is its showing as linux shell ...local suggester is also sayting a linux shelll and MS10-092 also considers as linux shell .. not able to privesc

  • @sierikas
    @sierikas 5 років тому

    Awesome tutorial! motivating to study!
    Thanks ippsec

  • @Raul111591
    @Raul111591 5 років тому +5

    @ippsec how do you paste from xclip onto a vim editor? I tried SHIFT + CTRL + V but that didnt seem to work

  • @IteLuis
    @IteLuis 6 років тому

    Nice, you are a metasploit ninja. Great work.

  • @CyberCelt.
    @CyberCelt. 2 роки тому

    Really great video. The way you think is so eye opening. I'm just confused in one part. In Burp you discovered the null byte and jsp.
    What was Metasploit trying to do with the text file added onto the jsp path? You then ignored that and clicked the jsp location. Thank you

  • @izaak791
    @izaak791 6 років тому

    thank you so much. this is gold teaching

  • @kalidrew5902
    @kalidrew5902 4 роки тому +2

    Control + r ( in Burp to send to repeater)

  • @zanidd
    @zanidd 6 років тому +1

    One question: Do you usually do these challenges for the first tine while recording, or do you solve them first and then record the solution?

    • @CosmoCopulates1
      @CosmoCopulates1 6 років тому +2

      I'm pretty sure it's the latter. He solves the challenges and then when he finds out which box is being retired he makes the video.

  • @fabiothebest89lu
    @fabiothebest89lu 7 років тому

    Thanks ippsec, I learn something new in every video..I knew about unicorn already but never used it before..port forwarding with burp interesting as well..you mentioned powerup..I'd like to see it in action in one of your videos if you get a chance to use it. Thanks for your videos.

    • @ippsec
      @ippsec  7 років тому +1

      Check Bastard out, that's a box I did without MSF and believe I used PowerUp.

  • @sumneetsharma9383
    @sumneetsharma9383 2 роки тому

    thanks brother for walkthrough

  • @ursr78122
    @ursr78122 5 років тому +1

    Hey, how did u know that all???? I'am too want to start with HTB, but dunno what learn first?

  • @demirozdemir5115
    @demirozdemir5115 5 років тому +2

    I got a question how do you make theese green tabs? I am pretty new to linux

    • @ippsec
      @ippsec  5 років тому +3

      Check the tmux video on my channel

  • @dileepgurajada3433
    @dileepgurajada3433 4 роки тому

    any better/other way to get a meterpreter shell from regular reverse shell?

  • @zjdljb
    @zjdljb 5 років тому +1

    Hmmmm, if someone is doing this box, can you share me how you do the escalation part?
    I follow IppSec and noted the script generate by the Unicorn is quite different from the video one and it does not work. IppSec's unicorn script starts with -w l - while in my scrip all the - become /
    I follow the HTB writeups and noted it is not possible to download an exe msfvenom, cannot get a meterpreter..lol

    • @RespectableMan-ci2jb
      @RespectableMan-ci2jb 5 років тому +1

      Hi, Just in case you hadnt had any luck since. I was having the same issues with unicorn so I generated shellcode with msfvenom and instead of using the powershell method to transfer it onto the box i used certutil.exe instead. Got my payload onto the box and my handler picked it up! Super frustrating but learned a fair bit. Check out LOLBAS on github for some alternative methods for file transfers on windows. hope that helps.

    • @krzysztofb.3227
      @krzysztofb.3227 4 роки тому

      @@RespectableMan-ci2jb thanks! that was very useful tip

  • @QG1996
    @QG1996 6 років тому +28

    wtf how you do all of this? i just signed in in hack the box.. and basicly i think i wont be able to do anything :P

    • @karanjoshi7438
      @karanjoshi7438 5 років тому

      Same scene for me lol 😂

    • @msphr7426
      @msphr7426 5 років тому +1

      @@karanjoshi7438 And now ? lol 7 month after

    • @msphr7426
      @msphr7426 5 років тому

      now ?

    • @irfan4701
      @irfan4701 5 років тому +1

      @@msphr7426 its just same

    • @mcds6307
      @mcds6307 4 роки тому +1

      Η διαδικασία είναι πάνω κάτω η ίδια. Απλά την μαθαίνεις. Ξεκινάς με ένα nmap scan, βλέπεις τι υπηρεσίες τρέχει και ψάχνεις ανάλογα exploits. Από εκεί και πέρα θέλει λίγο περισσότερο ψάξιμο αλλά τα περισσότερα μαθαίνονται σε λίγους μήνες.

  • @davidgroover7963
    @davidgroover7963 3 роки тому

    I cannot get the unicorn payload to work for me....

  • @covertly_overt
    @covertly_overt 4 роки тому +1

    If by any chance this section is still active, can anyone help with the powershell_attack.txt file? For me the encrypted code is not similar to the above; It comes under two different headers namely - 'AMSI bypass code' and 'actual Unicorn payload'. I have tried running it natively but the stager doesn't get sent.
    Any suggestions on how to edit the powershell_attack.txt file?

    • @asielezra8227
      @asielezra8227 4 роки тому

      same problem

    • @covertly_overt
      @covertly_overt 4 роки тому +1

      @@asielezra8227 I could not figure out the problem with PowerShell file and hence created an .exe payload using msfvenom, which worked for me.

    • @kret63
      @kret63 4 роки тому

      Stumbled on the same problem, thanks for the tip!

    • @flamingoindigo4253
      @flamingoindigo4253 4 роки тому +1

      ​@@covertly_overt So you use msfvenom to generate payload. Upload it. And use the same expression to download and excuse it ( powershell "IEX(......)")
      And meanwhile with msfconsole multi handler listening ?

    • @covertly_overt
      @covertly_overt 4 роки тому

      @@flamingoindigo4253 Yeah I too did the same and it worked. Thanks :)

  • @tiagosa1773
    @tiagosa1773 6 років тому +1

    I'm a noob and i have a question as to why you do all the commands from /Documents/htb/boxes/arctic instead of doing the commands from just root

    • @ippsec
      @ippsec  6 років тому +6

      Just to stay organized. If I want to save output it generally goes to the current working directory

  • @panagiotismitkas5526
    @panagiotismitkas5526 7 років тому

    Hey Ippsec great job you are doing there as usual.I have one question,is there a way to get system without meterpreter,thus without using this unicorn tool?I mean after getting the reverse shell to try to escalate from there

    • @ippsec
      @ippsec  7 років тому

      Yep. When i get around to doing the video on Bastard, I won't use Meterpreter (or Unicorn) -- Should be next week.

    • @gmanx345
      @gmanx345 6 років тому

      You could probably (because I haven't tried) execute more than just "cmd.exe" in the initial exploit to launch a powershell agent connecting back to C2.
      Secondly, instead of nc listener, setup exploit/multi/handler with necessary windows reverse_tcp handler and sent the POST request again.

  • @dom252
    @dom252 6 років тому

    Just trying to understand exactly why we used unicorn here. Was it to upgrade the simple reverse shell to a meterpreter session?

    • @ippsec
      @ippsec  6 років тому +2

      Yep. Unicorns a relatively reliable way to get Meterpreter up and running from a simple powershell command.

    • @dom252
      @dom252 6 років тому

      Thanks . Hadn't come across it before, will add it to the bag of tricks.

    • @nuralam6797
      @nuralam6797 6 років тому

      cooooooool

  • @aabid3677
    @aabid3677 5 років тому

    Youre really awesome!

  • @vonniehudson
    @vonniehudson 5 років тому

    How did you paste from xclip into vim? Ctrl+Shift+v didn't work for me.

    • @biigsmokee
      @biigsmokee 5 років тому +1

      when in insert mode, hit ctrl-r *
      or type :set paste

  • @smithrules6226
    @smithrules6226 4 роки тому

    How do we know that we will use .jsp as shell extension? we could use asp, aspx etc since CF is using also that languages?

    • @kret63
      @kret63 4 роки тому

      The metasploit module sends payloads in .jsp

  • @kosmonautofficial296
    @kosmonautofficial296 5 років тому +1

    Who does IppSec watch when he wants to learn?

  • @7Shol
    @7Shol 4 роки тому

    Impressive

  • @mxmpomr5739
    @mxmpomr5739 4 роки тому

    精彩,非常精彩

  • @krishnadeshpande6197
    @krishnadeshpande6197 6 років тому

    Hey can we use that netcat trick in OSCP exam because I've heard that we can use msfvenom for all those 5 machines

    • @ippsec
      @ippsec  6 років тому +1

      I don't see why you wouldn't be able to, but I'd ask OffSec to be sure.

    • @hamzagondal8217
      @hamzagondal8217 6 років тому

      You can use msfvenom as many times as you want for OSCP. The instructions are pretty clear on the use of metasploit though.

  • @surgen
    @surgen 6 років тому +1

    Hi, is there any difference between using unicorn.py or use the web_delivery module? At the end the two are powershell meterpereters right?

    • @ippsec
      @ippsec  6 років тому +1

      End result is the same. How it gets there is different. Just look at the powershell code from Unicorn and Web Delivery and you'll see they are a bit different.

  • @neoXXquick
    @neoXXquick 7 років тому

    really really nice..

  • @jemsbond2029
    @jemsbond2029 5 років тому +2

    can i use unicorn in oscp exam?

  • @seraphicguitar
    @seraphicguitar 6 років тому

    bro can we do ms10-092 without metasploit ?

  • @roblou8222
    @roblou8222 5 років тому

    i have an issue where, once i get a meterpreter sessions and i interact with the session it just says Unknown command: sysinfo. anyone else have an issue like this? i even tried on my local test systems on vmware and it seems that with unicorn sessions i always get this issue.

    • @rickjames3034
      @rickjames3034 3 роки тому

      i could be wrong but i think sysinfo is for powershell, systeminfo works in cmd

  • @seanalvarado3638
    @seanalvarado3638 7 років тому

    wow men, you are IT. Is it good to learn for a beginner like me to start learning python first before i get my feet wet in CTF's. I feel like i need to learn to program and learn networking concepts first. You are awesome

  • @yahiamito6339
    @yahiamito6339 7 років тому

    hey ippsec , i've seen in a video th\t you're using "john2ssh" on other machine could you plz share this machine specs ????

  • @zionstemple
    @zionstemple 5 років тому +1

    Tried to do the walk through Arctic kept dying on me. Great tutorial s#ity VM.

  • @indifferent1
    @indifferent1 5 років тому

    -sC is for default script not safe scripts... i am pretty sure you know this and it must have been a slip of tongue.

  • @angryoldcanadian3905
    @angryoldcanadian3905 5 років тому

    everytime I follow these walk throughs, it fails on my box :/ got nothing from burp... then I try the pdf walkthrough and get nothing but time outs when I try to upload the script.

    • @roblou8222
      @roblou8222 5 років тому

      dont feel too bad. i am doing this box now and i have the same issue. Burp wont return anything to me. in the other walkthrough my reverse shell never starts even though the coldfusion downloads my file from my python web server

    • @seanconley104
      @seanconley104 5 років тому

      @@roblou8222 it took several views for me to realize that the post was already populated in the burp 'repeater' request. that would have been there from a previous run. I thought you might be stuck on the same thing with burp.

    • @yenitrk
      @yenitrk 5 років тому

      did you include jsp, xml or appropriate file types to intercept? I see some js codes there in the video

    • @roblou8222
      @roblou8222 5 років тому

      ​@@seanconley104 Hi Sean. I have come back to Arctic again after some time and still the same issue. nothing in burp. Actually i just edited this post. you correct. so what ippsec done was send it to repeater first without sending it from the proxy tab. my response did come back to the proxy tab rather than repeater. Thank you.

  • @fahadalmulhim461
    @fahadalmulhim461 4 роки тому

    it was will be better if you solve it with out metasploit ... Thanks

  • @alfinjoseph6854
    @alfinjoseph6854 7 років тому

    haiiiiii

  • @chrischrischrischris2464
    @chrischrischrischris2464 7 років тому

    By the way, this vid shouldnt be on yt. Because of u i lost my points -_- AND THIS MATTERS XD

    • @ippsec
      @ippsec  7 років тому +2

      Not because of me. I post videos after they retire the box, which is when they lose points. Admins of the site have no problem with these videos.

    • @chrischrischrischris2464
      @chrischrischrischris2464 7 років тому

      They should cause of 'ownershipPercentage' param in counting points
      formula looks like that
      'Formula: round((userOwnPoints + systemOwnPoints + challengeOwnPoints + userBloodPoints + systemBloodPoints) * ownershipPercentage)'

    • @ippsec
      @ippsec  7 років тому +14

      It's possible that ownership doesn't include retired, not sure there. If the owners change their stance I'll remove the videos, but as of right now I believe they do more good than bad. In the end points don't really matter and I know they've helped people learn.

    • @harispylarinos5534
      @harispylarinos5534 7 років тому

      Ownership % calculates all machines including retired.

    • @ippsec
      @ippsec  7 років тому +16

      Yes, when a box becomes retired all points are removed. That way new users can still get high on the leaderboard and it doesn't become a game of who has been around longer.