HackTheBox - Shared

00:00 - Intro
01:00 - Start of nmap
02:30 - Taking a look at the website
03:00 - Searching the PrestaShop github to find a way to fingerprint the website, discovering INSTALL.TXT then finding the commit that contains our version
07:10 - Discovering checkout.shared.htb
08:14 - Examining how the checkout subdomain gets the contents of the shipping cart (cookies), editing the cookie and seeing what happens
09:45 - Testing for SQL Injection within the cookie
12:20 - Failing to use SQLMap (Debug it at the end of the video)
14:40 - Doing the Union SQL Injection manually to enumerate Information Schema then dump the users table and get the passwords
18:45 - Cracking the password for James_Mason and gaining SSH Access
21:00 - Finding files modified between two dates on linux and discovering some interesting files
22:30 - Grabbing passwords from the web directory
26:00 - Discovering iPython is opened every minute based upon the history file
27:20 - Telling LinPeas to look for unique processes and discovering the directory iPython is being ran from
31:45 - Creating a malicious profile to gain code execution when ipython is opened and gaining a shell as dan_smith
35:00 - Discovering a golang program that utilizes Redis, copying the binary to our box
37:00 - Having Redis connect to netcat and getting the password in clear text
38:00 - Enumerating Redis
39:00 - Creating a malicious Redis Module, loading it within Redis and getting code execution
41:25 - Getting a reverse shell as root
42:00 - Going back and getting SQLMap to run. Enabling Debug so we can see the requests SQLMap makes

Support the originator by clicking the read the rest link below.