GETTING STARTED - HTB - 2

preview_player
Показать описание
Run an nmap script scan on the target. What is the Apache version running on the server? (answer format: X.X.XX)

Рекомендации по теме
Комментарии
Автор

Man, thank you for actually walking through the box as stated, instead of jumping around other tools to establish the reverse shell.

hottlatoani
Автор

thank for help! I got wrong direction when I guessed admin credentials and I was trying to enable file upload in the app, this video saved me

jasonblind
Автор

thank you, you've been a great help

blacksupaman
Автор

thanks! I forgot about gftobins and I lost 2 hours trying to escalate privileges executing php scripts

tecnoChannell
Автор

Yo, man. I have a question. On the *Knowledge check section* in the first task, how did you know you had to search for getsimple? Is there any algorithm you use? Thank You in advance.

СветославАнгелов-эб
Автор

Got suck on the getting root access;_; I found that i could use the php file, but i was unable to edit that file.

YvtqKn
Автор

Actually user and password were found admin:admin. So I wonder if that first exploit would work although I went with the second

ReverseShell
Автор

Ahh so there was an other way to get to root

I ended up making a file to gain root
<?php system ("su root"); ?>

sudo php -f file.php

Then I checked this video after I was done to see what I could have done different :) :D .. was kinda hoping for a non metasploit version. Since I was able to find an api-key..maybe that could have done something :D

Ah idk why I did not try to manually input passwords

admin:admin

Then you can change the theme php into a reverse shell one haha

rudiminnaar
Автор

I don't understand where the password (nibbles) [8:02] came from????

johnbanes
Автор

min 8:00 how did you know the password was

gamemakerfacilito
Автор

but the shell command at 33.14 what do?

francesco