Hathor - HTB [Discussion]
by - Thursday, January 1, 1970 at 12:00 AM
I tried to exploit BM with a impersonation aspx vb script but i think it's not allowed by the line xml <identity impersonate="false" in Web.config
so i think it's a rabbit hole
Reply
You
(April 22, 2022, 12:36 PM)Exa Wrote: net view \\hathor shows a share which can be mounted as the BM user. There is some interesting stuff on it.


You can write in to that share also ... not sure how to proceed still .
Reply
Next step is DLL Hijacking ! :D
Reply
(April 23, 2022, 01:26 PM)cavour12 Wrote: Next step is DLL Hijacking ! :D


Bar the 7-zip dll on the share drive, which we can write to ... any other ideas why it's a dll hijack ? seems like it's more of a replacement then hijacking really
Reply
I live in unkown :at:
Reply
(April 23, 2022, 02:53 PM)joeydalips Wrote:
(April 23, 2022, 01:26 PM)cavour12 Wrote: Next step is DLL Hijacking ! :D


Bar the 7-zip dll on the share drive, which we can write to ... any other ideas why it's a dll hijack ? seems like it's more of a replacement then hijacking really


Refer to https://book.hacktricks.xyz/windows/windows-local-privilege-escalation/dll-hijacking for DLL hijacking
The second one under "Your own" works.. got the user flag.. But what's next?  :cry:
This user is a member of ITDep, while ITDep is a member of Account Operators...
Tried changing password, creating new account, adding to other group, but none work  :(

Any nudge will be appreciated.. thanks
Reply
(April 23, 2022, 07:02 PM)yemacaw863 Wrote:
(April 23, 2022, 02:53 PM)joeydalips Wrote:
(April 23, 2022, 01:26 PM)cavour12 Wrote: Next step is DLL Hijacking ! :D


Bar the 7-zip dll on the share drive, which we can write to ... any other ideas why it's a dll hijack ? seems like it's more of a replacement then hijacking really


Refer to https://book.hacktricks.xyz/windows/windows-local-privilege-escalation/dll-hijacking for DLL hijacking
The second one under "Your own" works.. got the user flag.. But what's next?  :cry:
This user is a member of ITDep, while ITDep is a member of Account Operators...
Tried changing password, creating new account, adding to other group, but none work  :(

Any nudge will be appreciated.. thanks


I got code execution too. Did you get a (reverse) shell as ginawild?
Reply
(April 23, 2022, 09:19 PM)Exa Wrote:
(April 23, 2022, 07:02 PM)yemacaw863 Wrote:
(April 23, 2022, 02:53 PM)joeydalips Wrote:
(April 23, 2022, 01:26 PM)cavour12 Wrote: Next step is DLL Hijacking ! :D


Bar the 7-zip dll on the share drive, which we can write to ... any other ideas why it's a dll hijack ? seems like it's more of a replacement then hijacking really


Refer to https://book.hacktricks.xyz/windows/windows-local-privilege-escalation/dll-hijacking for DLL hijacking
The second one under "Your own" works.. got the user flag.. But what's next?  :cry:
This user is a member of ITDep, while ITDep is a member of Account Operators...
Tried changing password, creating new account, adding to other group, but none work  :(

Any nudge will be appreciated.. thanks


I got code execution too. Did you get a (reverse) shell as ginawild?


no..  :(  well I didn't expect to get a reverse shell from ginawild.. but what code executions should i perform.. :-/
Reply
I've mounted the \\hathor share with the creds from the csv but im unsure where to go next. Could someone give me a nudge...
Reply
(April 25, 2022, 01:11 PM)qwerty173 Wrote: I've mounted the \\hathor share with the creds from the csv but im unsure where to go next. Could someone give me a nudge...


Pay attention to the previous posts.
Reply


 Users viewing this thread: Hathor - HTB [Discussion]: No users currently viewing.