One of my favorite HackTheBox machines so far! In this video we cover every step of the way in order to complete this machine. The reason why I like this machine so much is because it touches a little bit of everything. We do the normal network/port scanning using NMAP. We then use DIRB to check out which directories are hosted on the web server. After looking at the web server and its login form, we bypass authentication using SQL injection. After getting lost with no where else to look, we look for subdomains. This presents us with ssh credentials to gain user access to the machine. From there we find an executable that can be used with sudo permissions.
This is where I had fun, the executable required a master password. I am not an expert with hacking and much less reverse engineering. This was first the time using Ghidra which was used to browse the application code and find the master password. Finally we then use docker to escalate our permissions by using a bind mount of the /root directory to our docker container.
Great stuff! All of which is very relevant to today.
Drop a like if you enjoyed the video and subscribe for more, it does not stop here!
As always, Never Stop Learning!
3 окт 2024