Hack The Box: Chemistry

Description Chemistry is an easy Hack The Box machine that features: Arbitrary Code Execution in pymatgen Python library and CIF files User Pivoting by cracking a hashed password in a database file Local Port Forwarding of an internal web application using aiohttp Python library Privilege Escalation via a File Traversal vulnerability in aiohttp Python library that allows retrieving the private SSH key of the root user Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.79.219. ...

March 8, 2025 · 8 min

Hack The Box: Instant

Description Instant is a medium Hack The Box machine that features: Leaked Administrator JWT token in the source code of an Android application package Subdomain enumeration in the XML network configuration of an Android application package API enumeration using one subdomain that provides the application documentation Brute Force to the login endpoint to recover the weak password of an API user Path Traversal vulnerability in an API endpoint that allows reading an user SSH private key Privilege Escalation by the decryption of a backup from the Solar-Putty application using a previously obtained password Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.132.27. ...

March 1, 2025 · 7 min

GSM Telephony (2G) - III - Base Station with Osmocom and Motorola Mobile️s

Introducción Amplifying the previous article, with the creation of a virtual GSM base station, it is possible to develop another proof of concept using the software OsmocomBB. With a phone with Calypso processor, such as the Motorola C115, C123, C140, C155 or V171, it is possible to create a physical GSM base station, with a limited functionality, only circuit-based operations such as sending and receiving text messages. This network can be connected to other physical devices by configuring the corresponding SIM card.️ ...

March 1, 2025 · 6 min

Hack The Box: Cicada

Description Cicada is an easy Hack The Box machine that features: Domain Controller enumeration using a NULL session User credentials recovered from a share accesible with a NULL session Domain Controller enumeration using a domain account User credentials recovered from the description of an user of the domain User credentials recovered from a share accesible with a domain account Initial access to the machine with a domain account that belongs to the Remote Management Users group Privilege Escalation via a dump of the SAM database using a domain account with the SeBackupPrivilege privilege Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.209.245. ...

February 15, 2025 · 11 min

Hack The Box: Trickster

Description Trickster is a medium Hack The Box machine that features: Cross-Site-Scripting in PrestaShop application that leads into Remote Code Execution User Pivoting by recovering the password of the user from the PrestaShop MySQL database Docker internal application changedetection.io discovery and local port forwarding Remote Code Execution in changedetection.io Docker application Privilege Escalation via a password leak in the Bash History of the container Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.80.146. ...

February 1, 2025 · 9 min

GSM Telephony (2G) - II - Virtual Base Station with Osmocom️

Introduction️ Osmocom (Open Source Mobile Communications) is an open source project dedicated to developing software and tools for mobile communication networks. Its main objective is to implement a range of mobile network technologies, such as GSM (2G), in an open and accessible way, with its different modules in the form of libraries.️ The project related to the creation of mobile networks is the CNI (Cellular Network Infrastructure), which are implementations of the protocol stack and network elements of GSM. The projects used for creating the network are OsmoMSC, OsmoBSC, OsmoSTP, OsmoHLR, OsmoMGW. On the other hand, we need the element that creates the base station, OsmoBTS, which supports different hardware and software devices. And finally, the transceiver that will support OsmoBTS, the component OsmocomBB.️ ...

February 1, 2025 · 12 min

Hack The Box: Strutted

Description Strutted is a medium Hack The Box machine that features: Image upload web application with Apache Struts vulnerable to Remote Command Execution User Pivoting by leaked credential in a configuration file Privilege Escalation by using tcpdump tool ran as root user Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.10.11.59. $ ping -c 3 10.10.11.59 PING 10.10.11.59 (10.10.11.59) 56(84) bytes of data. 64 bytes from 10.10.11.59: icmp_seq=1 ttl=63 time=44.1 ms 64 bytes from 10.10.11.59: icmp_seq=2 ttl=63 time=43.3 ms 64 bytes from 10.10.11.59: icmp_seq=3 ttl=63 time=43.5 ms --- 10.10.11.59 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2004ms rtt min/avg/max/mdev = 43.274/43.637/44.093/0.340 ms The machine is active and with the TTL that equals 63 (64 minus 1 jump) we can assure that it is an Unix machine. Now we are going to do a Nmap TCP SYN port scan to check all opened ports. ...

January 23, 2025 · 9 min

Hack The Box: MonitorsThree

Description MonitorsThree is a medium Hack The Box machine that features: SQL Injection in a web application to obtain user credentials Authenticated Remote Command Execution in Cacti web application Hash Cracking to obtain an user’s password, reused for a Linux user Local Port Forwarding to expose an internal Duplicati web application Privilege Escalation using Duplicati backup application having access to all the filesystem Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.216.196. ...

January 18, 2025 · 13 min

Hack The Box: Sightless

Description Sightless is an easy Hack The Box machine that features: Remote Command Execution in the SQLPad web application Escaping from Docker container by cracking the “shadow” hashes and logging through SSH Discovery of internal Froxlor web application and local port forwarding Password Recovery by using a debugging session of the Chrome browser Recovery of a KeePass database file password located in a FTPS service owned by Froxlor application Privilege Escalation by recovering the SSH login key from the KeePass database Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.172.196. ...

January 11, 2025 · 10 min

GSM Telephony (2G) - I - Decoding the protocol with gr-gsm

Introduction️ GSM (Global System for Mobile Communications) (2G) is a communication standard developed for the transmission of voice and data in mobile networks. Originally created in Europe in the 80s by the European Telecommunications Standards Institute (ETSI), it became the most popular mobile phone system worldwide, used by most mobile network operators around the world. The GSM technology allows users from different operators to communicate with each other and use services like SMS (text messages) or calls. With the arrival of 4G and 5G, the use of GSM networks has decreased and some operators are gradually removing support for these networks.️ ...

January 1, 2025 · 10 min