HackTheBox - Broker

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 มิ.ย. 2024
  • 00:00 - Intro
    01:00 - Start of nmap
    01:45 - Logging into ActiveMQ with admin:admin and then failing to use the exploit from 2016
    04:00 - Doing a full nmap scan, then running script scans on the open ports
    07:50 - Finding a page that talks about CVE-2023-46604, the latest activemq exploit
    11:00 - Pulling down an exploit payload for this exploit, it is golang
    12:30 - Modifying the payload to execute a reverse shell, instead of downloading and executing an elf file. Need to HTML Entity Encode the payload
    16:30 - Reverse shell returned, seeing we can run nginx as root
    17:20 - Building an nginx config that runs as root and shares the entire filesystem
    23:08 - Enabling the WebDav PUT so we can upload files to the server and uploading an SSH Key
    27:05 - Showing we could upload a cron entry aswell to get code execution

ความคิดเห็น • 40

  • @alihajir1841
    @alihajir1841 7 หลายเดือนก่อน +22

    Man you are awesome. I love the way you handle and understand things like it is nothing to you . I Wish i reach this level of professionalism.

    • @boogieman97
      @boogieman97 7 หลายเดือนก่อน +5

      You actually can. Ippsec reached this level by pure determination, tons of trial and error, a lot of reading, putting it into practice and most of all be curious and have the passion

    • @ippsec
      @ippsec  4 หลายเดือนก่อน +4

      +1 to @boogieman97 keep in mind I’ve been doing videos weekly for 5+ years. Which isn’t a long time at all, but more frequent than the average person. If you create a plan and stick with it I’m sure you’ll be near this level

    • @boogieman97
      @boogieman97 4 หลายเดือนก่อน

      @@ippsec next to that correct me if I'm wrong, I've heard in one of your earlier videos that your carreer is far most autodidactic. Apart from that that might not be "long", it is about dedication and willingness to commit. Thats why I am highly appreciating Ippsec and of course subscribed, so if you agree folks do so as well 😃

  • @kaushikreddychinnasani
    @kaushikreddychinnasani 6 หลายเดือนก่อน +2

    Cron Job Priv Esc learnt today, Great video.

  • @The_Dark_Cats
    @The_Dark_Cats 7 หลายเดือนก่อน +1

    I didnt think to try entity encoding the xml and resorted to the curl command. Nice to know about that now. My question is did we have to have all three lines in the xml? Or could it have been done with one? Great video as usual!

  • @ptrckm
    @ptrckm 7 หลายเดือนก่อน +1

    its not even weekend wow love it

  • @ru31k32
    @ru31k32 7 หลายเดือนก่อน

    Nice way of opening a shell using cron job. :)

  • @petervsjim
    @petervsjim 5 หลายเดือนก่อน

    wow the dav method and cron are amazing

  • @KyserClark
    @KyserClark 7 หลายเดือนก่อน

    Thanks for the tutorial!

  • @chiragartani
    @chiragartani 7 หลายเดือนก่อน +2

    First .. now let me watch 😁

  • @094b3x1
    @094b3x1 7 หลายเดือนก่อน

    Thanks ippsec ❤

  • @tntxqx8281
    @tntxqx8281 7 หลายเดือนก่อน

    Awesome ippsec!!

  • @felixkiprop48
    @felixkiprop48 7 หลายเดือนก่อน

    thumb up💯

  • @Ak4sh07
    @Ak4sh07 7 หลายเดือนก่อน +1

    ❤❤❤

  • @0xPr3d4T0r
    @0xPr3d4T0r 26 วันที่ผ่านมา

    You are crazy good man 👍👌

  • @guillaumeentournee
    @guillaumeentournee 26 วันที่ผ่านมา

    the privesc feels amazing

  • @sand3epyadav
    @sand3epyadav 7 หลายเดือนก่อน

  • @alanbusque6645
    @alanbusque6645 7 หลายเดือนก่อน

    Thanks

  • @gordona.freidman7308
    @gordona.freidman7308 7 หลายเดือนก่อน

    Thanks Ippsec

  • @tg7943
    @tg7943 7 หลายเดือนก่อน

    Push!

  • @BLACKSTORM-ux9zi
    @BLACKSTORM-ux9zi 7 หลายเดือนก่อน

    So basically is it a vuln in the class - ClassPathXmlApplicationContext which is part of the Spring framework? And this being used by ActiveMQ made it vuln as this class loaded a crafted XML config file

  • @WyldeZk
    @WyldeZk 7 หลายเดือนก่อน +4

    Hey Ippsec thanks for the awesome video as usual. Are you planning to make videos on new HTB-Sherlocks when they’ll retire?

    • @ippsec
      @ippsec  7 หลายเดือนก่อน +2

      I have not decided yet.

    • @yurilsaps
      @yurilsaps 6 หลายเดือนก่อน

      @@ippsecI would appreciate a lot! Or if you know someone that you trust to make them also

  • @steenbot6413
    @steenbot6413 6 หลายเดือนก่อน +1

    Hi Ippsec I was wondering if you could help? I am attempting this machine and I get into the activemq user initially through a meterpreter reverse tcp, then I get an interactive shell (python3 -c 'import pty;pty.spawn("/bin/bash")'.
    But when I try to edit the nginx.conf file with vi, the vi editor doesn't work properly and I can enter/exit insert mode or move around the text in the file with the arrow keys

  • @TekiZZ
    @TekiZZ 7 หลายเดือนก่อน

    In this box the port 2112 lists archive system of the machine with elevated privileges on the navegator

  • @jmee7580
    @jmee7580 4 หลายเดือนก่อน

    I have reset this box and gone through the same steps (i think) and there is no /root directory in /crontabs, also any file that gets uploaded doesnt have execute permissions(i changed permissions before uploading just in case). I uploaded the ssh keys just to login as root and check. Did they change the box?

  • @whilykitt
    @whilykitt 3 หลายเดือนก่อน

    Do you have a tutorial or can you recommend one on getting more comfortable with Vi/Vim?

  • @TazEdits_
    @TazEdits_ 6 หลายเดือนก่อน

    I got a 404 message not found error when I sent the file I tried send the packet without the poc xml and got a got a 200 get from server idk why

    • @GaelF30
      @GaelF30 หลายเดือนก่อน

      Im maybe late but i had the same problem. you have 404 because your poc-linux.xml file is on the CVE folder and your http server cant find it. just move poc-linux.xml to /home/[your account]/
      i guess you started you http server on home directory like me :'(

  • @iWhacko
    @iWhacko 7 หลายเดือนก่อน

    I can't find the challenge on HTB? (yes I'm looking under retired)

    • @ippsec
      @ippsec  7 หลายเดือนก่อน

      You may have a filter on your search.

  • @Fbarrett
    @Fbarrett 7 หลายเดือนก่อน

    Ippsec you said on a earlier podcast that you were going to start doing videos on the basic foundations of Hackthebox. Is that still in the works? Thanks.

    • @ippsec
      @ippsec  7 หลายเดือนก่อน +2

      I want to, just can't get the motivation. If you look at the technique videos, I think I've started covering things just not from a foundation perspective.

    • @Fbarrett
      @Fbarrett 7 หลายเดือนก่อน

      thanks@@ippsec

  • @sanfordfloridarepairs9668
    @sanfordfloridarepairs9668 7 หลายเดือนก่อน

    Nothing

  • @user-ms6lq1lm1c
    @user-ms6lq1lm1c 3 หลายเดือนก่อน

    I did a completely different technique for privesc using share object .so (Files), since we can modify the prefix with nginx i just needed to craft a .so files in a module directory, rename it correctly (ngx_http_echo_module.so), run with sudo ===> got error but BAM suid /usr/bin/bash -p