Back to Browse

HackTheBox - Ophiuchi

18.3K views
Jul 3, 2021
40:34

00:00 - Intro 00:45 - Start of nmap, looking at release date of tomcat 04:00 - Starting a bruteforce of /manager login to run in the background 06:55 - Playing with the YAML Parser, sending special characters leads to a stack trace showing the library 08:15 - Testing a YAML Deserialization payload for Snake YAML 09:15 - Start of weaponizing the payload 13:20 - Having a lot of trouble with building out a payload due to special characters 18:50 - Making it simple, just downloading a script then executing it 22:20 - Finally got a shell 24:10 - Going into how we know the sudoers file is non-default by date or filesize 25:00 - Finding out install date of a linux machine by SSH Host Key 25:50 - Finding where tomcat is installed and then grabbing the password out of the config tomcat-users 29:00 - Trying the tomcat password with the admin user 30:00 - Going over the go source code which can be ran with sudo 32:00 - Downloading the web assembly so we can decompile the wasm into a wat then edit it 37:00 - Got Root, showing why i used metasploit to bruteforce tomcat password (lockouts)

Download

1 formats

Video Formats

360pmp449.7 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

HackTheBox - Ophiuchi | NatokHD