July 9, 2022 at 12:37 PM
having hard times to configure DNS trough openvpn with update-systemd-resolved... worked before but doesn't anymore. ah well...
July 9, 2022 at 12:37 PM having hard times to configure DNS trough openvpn with update-systemd-resolved... worked before but doesn't anymore. ah well... July 10, 2022 at 2:36 PM Finally escalated to Scryh . Oh wow I know why this box is called Response now! Was fun though :P root part now. I think I got the logic already July 10, 2022 at 7:51 PM July 10, 2022 at 9:24 PM (July 9, 2022, 12:37 PM)yournamehere Wrote: having hard times to configure DNS trough openvpn with update-systemd-resolved... worked before but doesn't anymore. ah well... you could've use unbound instead of somethings like isc bind server, which is pretty terrible.. https://github.com/NLnetLabs/unbound something similar we've done on CrossFit2 box with unbound -> https://app.hackthebox.com/machines/CrossFitTwo July 10, 2022 at 10:17 PM (July 10, 2022, 09:24 PM)undeadly Wrote:(July 9, 2022, 12:37 PM)yournamehere Wrote: having hard times to configure DNS trough openvpn with update-systemd-resolved... worked before but doesn't anymore. ah well... Interesting ! Gonna give it a try. I ended up using dnsmasq after killing resolved. Needed to enable mx too July 14, 2022 at 3:16 PM Head banging time again ! the pcap file gives good info about the attack chronology we have 2 ssh sessions , but can't find a way decrypt them I tried volatility against the memory dump as mentioned by @Unbolted5053 , but can't get it to work either Gonna try to decrypt the metter session stream A little nudge would be appreciated ;) July 15, 2022 at 8:41 AM (July 14, 2022, 03:16 PM)yournamehere Wrote: Head banging time again ! This is part is why the box is insane imo. The goal of this part is to reconstruct the .zip archive that's been exfiltrated through meterpreter. There is some doc for this : https://github.com/OJ/clr-meterpreter/blob/master/streams/2019-04-25-Part-2/tlv.md https://www.rubydoc.info/github/rapid7/metasploit-framework/Rex/Post/Meterpreter/Packet https://github.com/rapid7/metasploit-framework/pull/8625 The core_dump is only useful for the AES key. July 15, 2022 at 10:50 AM (July 15, 2022, 08:41 AM)toatoat Wrote:(July 14, 2022, 03:16 PM)yournamehere Wrote: Head banging time again ! Thanks a lot ! That's exactly what I'm at right now. I should get it very soon July 17, 2022 at 5:44 PM (July 15, 2022, 10:50 AM)yournamehere Wrote:(July 15, 2022, 08:41 AM)toatoat Wrote:(July 14, 2022, 03:16 PM)yournamehere Wrote: Head banging time again ! so... I got the zip file reconstructed and extracted. the zip file is corrupt and so is the png. the key is useless. Nothing obvious here :s stegano maybe ? oh wow what a brainfuck ! July 18, 2022 at 8:58 AM (July 17, 2022, 05:44 PM)yournamehere Wrote:(July 15, 2022, 10:50 AM)yournamehere Wrote:(July 15, 2022, 08:41 AM)toatoat Wrote:(July 14, 2022, 03:16 PM)yournamehere Wrote: Head banging time again ! The key is mandatory in order to reconstruct the zip correctly. If your png/archive is corrupted after a binwalk, it means that you didn't extract the whole zip. Meterpreter packets are TLV packets (actually LTV packets) following one another. In order to extract the zip file, you got to parse the TLV packets by packet type too and append the payloads When your zip file is correctly extracted from the conv, you should have 5 file, 2 of them are important for the rest (yes it's not over yet and the rest is also tricky) |