Lab - HTB - Setup
Lab - HTB - Setup
starting point
Connections to the lab environment are made with OpenVPN, which comes pre-installed on Parrot and Kali.
- There are multiple different lab networks on Hack The Box, and you will require a connection pack for each.
Once you have downloaded your .ovpn
connection pack on your virtual machine, you can connect to the lab network with the following terminal command: sudo openvpn example.ovpn
example.ovpn
should be replaced with thefull path or filename for your connection pack
.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
ports=$(nmap -p- --min-rate=1000 -T4 10.10.10.27 | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//)
nmap -sC -sV -p$ports 10.10.10.27
// Ports 445 and 1433 are open, which are associated with file sharing (SMB) and SQL Server.
smbclient -N -L \\\\10.10.10.27\\
// checking to see if anonymous access has been permitted, as file shares often store configuration files containing passwords or other sensitive information. We can use smbclient to list available shares.
smbclient -N \\\\10.10.10.27\\backups
// a share called backups. Let's attempt to access it and see what's inside.
// There is a dtsConfig file, which is a config file used with SSIS.
<DTSConfiguration>
<DTSConfigurationHeading>
<DTSConfigurationFileInfo GeneratedBy="..." GeneratedFromPackageName="..." GeneratedFromPackageID="..." GeneratedDate="20.1.2019 10:01:34"/>
</DTSConfigurationHeading>
<Configuration ConfiguredType="Property" Path="\Package.Connections[Destination].Properties[ConnectionString]" ValueType="String">
<ConfiguredValue>Data Source=.;Password=M3g4c0rp123;User ID=ARCHETYPE\sql_svc;Initial Catalog=Catalog;Provider=SQLNCLI10.1;Persist Security Info=True;Auto Translate=False;</ConfiguredValue>
</Configuration>
</DTSConfiguration>
// We see that it contains a SQL connection string, containing credentials for the local Windows user ARCHETYPE\sql_svc
invite
- open the Chrome Developers Tools.
- Go through the elements tab and you will find a script with source (src) as: /js/inviteapi.min.js
- go to https://www.hackthebox.eu/js/inviteapi.min.js .
- makeInviteCode looks interesting. go back to https://www.hackthebox.eu/invite and try to find its contents.
- Goto console tab in Chrome Developer Tools, and type
makeInviteCode()
. You will get a 200 Success status and data as shown below. - the text is encrypted and the encoding type is ROT13.
- decode that message
- need to make a POST request to “https://www.hackthebox.eu/api/invite/generate”.
curl -XPOST https://www.hackthebox.eu/api/invite/generate
- success message as:
{“success”:1,”data”:{“code”: “somerandomcharacters12345”, “format”: “encoded”}, “0”:200}
- decoding it
XRCDC-VBPZS-ROGKG-OUDBT-WTHIW
##
.
This post is licensed under CC BY 4.0 by the author.
Comments powered by Disqus.