Enumeration The start step for this box is as usual. I am using nmap to check which ports are open and what services are there. As it can be seen from the picture above there are two ports open. My method is to start on port 80. From the scan results it can be seen that there is an Apache server that runs and Drupal version 7. Also we ca see several file locations. That is a lot of information from a single scan. Foothold After some googling I found that Drupal 7 can be exploited with a metasploit module. That is awesome! The module that needs to be used…
-
-
Spectra Write Up – Hack The Box
Enumeration The start step for this box is as usual. I am using nmap to check which ports are open and what services are there. As you can see there are several ports open. In general I start my recon from port 80. Port 80 means that there is some kind of a web page. Usually from previous experience I edited my /etc/hosts file to add spectra.htb. At first glance at the page … well it does not give a lot of information. There are 2 links and of course the rule is “Click all links” so I did that. I run also dirbuster in the background because one of…
-
Bucket Write Up – Hack The Box
Enumeration: Lets start with running nmap. You can see the picture bellow and the command used to obtain that scan. nmap -T4 -A -Pn 10.10.10.212 From the scan we see that there is a redirect to http://bucket.htb/, So what I did is add it to the /etc/hosts. After go to the domain. I usually check the source to see if there is something interesting. And there it was. I added this new domain to the hosts file. I checked both places. The next step is to scan for other directories. I used gobuster. Bellow you can see the command and use it. sudo gobuster dir -w '/usr/share/wordlists/dirb/big.txt' -t 50 -e…
-
Delivery Write Up – Hack The Box
Enumeration: To start the enumeration as always I am using nmap to see which ports are open and what services are available on that ports. As you can see from the screen shot, there are two ports open. Port 80 and port 22. Usually I start on port 80. Lets see what do we have there. Oh look it is a website what a surprise. Lets see the source and if we can find something. Oh.. thats good. we found a url. http://helpdesk.delivery.htb That is nice. After some more enumeration I found one more url:delivery.htb:8065 This can be seen in other place if you follow the links on the “Contact”…
-
Fuse Write Up – Hack The Box
Enumeration: Lets start with whats open on the box and what we can exploit. A quick nmap scan gives us: Holly Fu@k so many ports. I usually start with port 80. By going to the webpage I noticed that the URL is wired, so i decided to add it to the /etc/hosts. Ok so now we have a website. I started browsing around and hoping I can use something. Then I start seeing some users that have used the specific printer. I made a list of all users. You can check it bellow: pmerton, tlavel, sthompson, bhult, administrator Well time to collect some passwords because now we have bunch of…
-
Tabby Write Up – Hack The Box
Enumeration First I started with the enumeration of the box. A simple nmap scan with a command gave me the result: Initial Foothold: From the nmap results we can see that there are 3 ports open: 22, 80, 8080. We can also see that on port 8080 there is a Tomcat server running. The website on port 80: The website on port 8080: After clicking on all the links on the port 80 website I found something interesting. From here you need to do some steps. First add megahosting.htb to the /etc/hosts After that is done we can see that we have the possibility for LFI. I ususally try to…
-
Traceback Writeup – Hack The Box
Initial Foothold: As usual the first thing to do when starting on a new box is to run a scan and see what we have to work with. As you can see from the image above we have two ports open. Port 22 and Port 80. Lets take a look what port 80 has to offer. Looks like a webpage without any links. My next step was to check the source code of the page. From this we can take away that there is a backdoor left open and that the hacker name is Xh4H. So google here I come. Google led me to a twitter post which led me…
-
Blunder Writeup – Hack The Box
Initial Foothold: Hello everyone. Today we are going to work on Blunder. As always the first step is Recon! Time to see what ports do we have open on that box. In the picture bellow you can see the nmap command I used. Well we have only one open port and that is port 80. This scan shows us also the server version and some headers. Usually when I am on a box with open port 80 I like to visit the page and see what it contains. OK … that is what we have. A page with articles. My clicking on the links we just go to more detail…
-
Protection ByPass and Brute Force attack – Bludit v. 3.9.2
So this post will describe a how to bypass protection in Bludit CMS v. 3.9.2 that is if you have a username. After managing to find the password I will discuss what metasploit module can help you to get a reverse shell. So, lets begin. If we check the documentation that Bludit provides we can see how they are preventing brute force attacks. Here is a screenshot and the link if you want to read through the whole documentation. https://docs.bludit.com/en/security/brute-force-protection After some googling I found a script that I just edited. I will post the script here and the link to the original article. https://rastating.github.io/bludit-brute-force-mitigation-bypass/ What you will need to…
-
Mango WriteUp – HackTheBox
Enumeration: Enumeration is pretty important as we all know. So the first thing we do is run an nmap scan to see which ports are open and what is running on that machine. We can see that we have 3 ports that are open – 80, 443 and 22. Initial Foothold: For me the start of this box was hell. It was like that because I didn’t look close enough in the nmap results. So I needed to ask on the discord chat for help. But let me explain. By examining all the ports we can see that we have an http server on port 80. If you try to…