Posts

HackTheBox: Beep

Image
 Hello Friends, welcome back to my blog for another writeup based on Hack The Box series for machine named BEEP. So starting with nmap scan,  We got output with many ports and their services. Lets check out the website as port 80/443 are open. Lets find out about the directories by brute forcing using gobuster. Here we could see the directory named vtigercrm, management portal if tried to access goes to index.php page. So when researched about the vtigercrm, we got to know about exploit db number 37637 LINK: https://www.exploit-db.com/exploits/37637 This machine is exploitable using LFI vulnerabilities as mentioned in exploitdb 37637 number exploit. Working through we get to know about //etc/amportal.conf%00&module-Accounts&action. Just view page source and it would give you sorted view. Gather all the password and usernames from the page source and save it in files username.txt and password.txt respectively. now we dont know the actual userid password so we can try br...

HackTheBox: Popcorn

Image
Welcome back Guys to another writeup on Hack the Box, machine named POPCORN. So Lets start with Network Mapper (NMap scan). *This time I wont share complete output just the required content would be shared here.     So now lets check the web portal as port 80 is working. So after seeing the webpage we should see which web directories are available for this web portal. So lets use Dirbuster for directory bruteforcing. While the attack was going on I encountered an file named torrent.  So lets check the webpage  So encountering this webpage signup and login in the webpage and checkout all the possible tabs in this webpage. Researching through got to know about Browse tab and upload tab, uploaded content is torrent file of kali linux and in upload tab we can upload torrent files. So lets upload any torrent file and see what can be done to get remote code execution/reverse shell from this page. So this is how was the response and then we would go to edit this torrent opt...

HackTheBox: Lame

Image
Hello Friends, Welcome to the first ever writeup on easy box released on 15th March, 2017 on Hack The Box named LAME. So lets start with Network Mapper command. (As stated below) So rectify the output of this command So as we can see we got 4 ports open in this machine as listed below. As you can see port no. 21 and 22 would need login user id and password so we wont bother there, and enumerate port no. 139 and 445. Were exactly port no. 139 does not mention us the version number we would go with port 445. Lets search version of services running on on port no. 445 that is Samba smbd 3.0.20-Debian . Going through we get to know about metasploitable tool, and how to use it for this vulnerability. LINK: https://www.rapid7.com/db/modules/exploit/multi/samba/usermap_script/   Using this we would try to gain reverse-shell. Note that RHOSTS is HTB's machine IP address, and LHOST is your machine IP address after using vpn which you can find using following command. We have got into the mac...

HackTheBox: Devel

Image
 Welcome Back Guys, Today we are going to talk about Hack The Box machine named DEVEL. So lets start with Network Mapper (NMAP) scan. After rectifying the output, conclusions for this is.  As we can see two ports are running port 21, 80 for FTP, HTTP respectively. So lets check port 80 first Now lets see the FTP port no. 21 using command Seeing the output, we can rectify that we can send any file from our machine to the victim machine. So lets try sending a aspx file for getting a reverse shell from that. So my file would be like shell.aspx and this would be created from using below mentioned command. Now lets upload the file through FTP onto 10.10.10.5, and then start the listener on port no you specified while making payload in msfvenom command. Now access the payload using URL as /shell.aspx So now check whether you have received the reverse connection from website or not. But still we dont have access to any users like Babis nor Administrator. So we would check the system...