Enumeration First I started with the enumeration of the box. A simple nmap scan with a command gave me the result: Initial Foothold: From the nmap results we can see that there are 3 ports open: 22, 80, 8080. We can also see that on port 8080 there is a Tomcat server running. The website on port 80: The website on port 8080: After clicking on all the links on the port 80 website I found something interesting. From here you need to do some steps. First add megahosting.htb to the /etc/hosts After that is done we can see that we have the possibility for LFI. I ususally try to…
-
-
Traceback Writeup – Hack The Box
Initial Foothold: As usual the first thing to do when starting on a new box is to run a scan and see what we have to work with. As you can see from the image above we have two ports open. Port 22 and Port 80. Lets take a look what port 80 has to offer. Looks like a webpage without any links. My next step was to check the source code of the page. From this we can take away that there is a backdoor left open and that the hacker name is Xh4H. So google here I come. Google led me to a twitter post which led me…
-
Reverse Shell vs Bind Shell
Reverse Shell Hello guys and girls. This post will just explain the difference between this two types of shell. In a later post I will provide a demo, that you can follow along. This shell is initiated from the target host to the attacker’s machine. The attackers machine should be into listening state to be able to pick up the shell connection. Why use reverse shell and not bind shell? Well reverse shells solve several issues that can be encountered. With reverse shells there is no need of a listener on the target machine. This type of shells can use commonly used and open ports like 80 or 443 –…