HackTheBox - Cache
0. Preface
I think this was the second box I completed on HTB. Iโve come a pretty long way since then.
Pretty fun box, especially with the OpenEMR exploits that you could do. I didnโt know about the memcached service before doing this box either. The Docker privilege escalation path was interesting, but it took a little while for me to wrap my head around how to do it.
In this box, we will be tackling:
- Careful reading
- Enumeration with SQL Injection on OpenEMR
- Getting a reverse shell with an OpenEMR CVE
- Looking through memcached service
- Exploiting Docker containers to get a root shell
Continue Reading...
HackTheBox - Blackfield
0. Preface
If you didnโt know that you could reset passwords through RPCClient, now you do. I also never had a chance to play with SeBackupPrivilege tokens, so this was a very nice learning opportunity as well.
In this box, we will be tackling:
- ASREPRoasting to get valid users and TGTs
- Using RPCClient to reset passwords
- Reading memory dump of lsass
- Abusing SeBackupPrivilege token and dumping NTDS.dit
Continue Reading...
HackTheBox - Admirer
0. Preface
This box is pretty frustrating due to the amount of rabbit holes I got stuck in, but at least I learnt something new from this. Moral of the story - donโt always rely on one tool or wordlist.
In this box, we will be tackling:
- Getting stuck in rabbit holes.
- Exploiting Adminer
- Hijacking Python libraries
Continue Reading...
Home