Skip to main content

Posts

Hackthebox - Retired - JSON

Hackthebox - Retired - JSON Recon As always I start with a simple up/down scan on all TCP ports for a staged scan nmap -T4 -p- -oX ./nmapb.xml 10.10.10.158 Then I convert the output to HTML # xsltproc ./nmapb.xml -o ./nmapb.html That's a lot of open ports Lets scan just those ports with the -A switch to finger os/services # nmap -T4 -p21,80,135,139,445,5985,47001,49152,49153,49154,49155,49156,49157,4915 -A -oX ./nmapf.xml 10.10.10.158 Then convert that to HTML # xsltproc ./nmapf.xml -o ./nmapf.html Looks like we got a windows box with a Filezilla FTP on 21, IIS on 80 and netbios/smb, with RPC on 5985 Let's start poking around. SMB is open but no shares for anonymous Same story for FTP At least 80 is open, there is a page displayed briefly then it redirects to this login page Same old song for rpc Dirb found r oot@kali:~/Desktop/HTB/json# dirb http://10.10.10.158 ----------------- DIRB v2.22     By The Dark Raver

HackTheBox.eu - Retired - October

Hackthebox.eu - Retired - October Recon As always I start with a simple UP/Down scan on all TCP ports to see what is live. # nmap -T 4 -p- -oX /root/Desktop/HTB/October/nmapb.xml october.htb Then I convert the output to HTML to make it pretty xsltproc /root/Desktop/HTB/October/nmapb.xml -o /root/Desktop/HTB/October/nmapb.html Not much open just 22 and 80 Let's scan those ports with -A to try to finger OS/Services # nmap -T 4 -p22,80 -A -oX /root/Desktop/HTB/October/nmapf.xml october.htb Then convert that to HTML too Let's see what is on port 80 A quick google search around for october CMS we see a lot of authenticated attack vectors. Let's see if we can create an account. Exploit Just filling in some generic things, I set the password to "password" (BTW test@test.com said it was already taken) Now it wants us to change the password I changed the password to Password1. After doing this I don't think this step was