http://0.0.0.0:4000/
tinyb0y
This blog is a collection of writeups. Hackthebox, TryHackMe, Bugs
2022-01-18T11:53:21+05:30
tinyb0y
http://0.0.0.0:4000/
Jekyll
© 2022 tinyb0y
/assets/img/favicons/favicon.ico
/assets/img/favicons/favicon-96x96.png
Developer HTB
2022-01-15T05:30:00+05:30
2022-01-15T05:30:00+05:30
http://0.0.0.0:4000/posts/Developer/
tinyb0y
A tricky machine where we had to phish the administrator to obtain the credentials using tabnabbing technique. Next exploiting sentry application to execute command injection. Third Stage is to reverse the binary and decode the message to obtain a password.
Stage 1: TabNabbing Attack
Stage 2: Sentry RCE
Stage 3: 64 bit ELF Reverse Engineering
NMAP
Nmap scan report for 10.129.219.217
Host...
Previse HTB
2022-01-08T05:30:00+05:30
2022-01-08T05:30:00+05:30
http://0.0.0.0:4000/posts/Previse/
tinyb0y
An easy box with an unvalidated redirection vulnerability, access to registration page and dump the file sitebackup.zip and exploit a post parameter to get remote code execution on the machine. Use the mysql configuration file and enumerate accounts in database and crack the password to get user on the machine. For root the sudo user can run a script where the attacker can inject the path va...
Writer HTB
2021-12-11T05:30:00+05:30
2021-12-11T05:30:00+05:30
http://0.0.0.0:4000/posts/Writer/
tinyb0y
Writer
A very good box with a good knowledge on how postfix filters work and ubuntu apt installer.
Nmap
Recon
SQL Injection
FootHold
User escalation
Root Privilege Escalation
Nmap
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.2 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-server-head...
Pikaboo HTB
2021-12-04T05:30:00+05:30
2021-12-04T05:30:00+05:30
http://0.0.0.0:4000/posts/Pikaboo/
tinyb0y
A very tough box with a good knowlege of webservers and perl scripting and a bit of code workthrough.
Nmap
Recon
Nginx/Apache Misconfiguration
FootHold
User escalation
Root Privilege Escalation
Nmap
root@kali:~/ctf/htb/Pikaboo/10.129.142.104/nmap# cat Basic_10.129.142.104.nmap
# Nmap 7.80 scan initiated Sun Jul 18 00:53:07 2021 as: nmap -Pn -sCV -p21,22,80 -oN nmap/Basic_10.1...
Intelligence HTB
2021-12-04T05:30:00+05:30
2021-12-04T05:30:00+05:30
http://0.0.0.0:4000/posts/Intelligence/
tinyb0y
Nmap Scan
PORT STATE SERVICE VERSION
53/tcp open domain?
80/tcp open http Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2021-07-04 12:15:15Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap ...