HackTheBox - Academy

00:00 - Intro 01:30 - Start of nmap 03:00 - Adding academy to our host file, then taking a look at the web page 08:50 - Discovering a weird port (33060), attempting to enumerate it manually 13:15 - Discovering from our gobuster results 14:20 - Playing with having spaces in usernames, then seeing roleid in the parameter 16:30 - Creating and logging in with an admin to see a new vhost 18:00 - Looking for Laravel Exploits, finding a metasploit module 19:00 - Getting the APP_KEY from the laravel error page, which is needed for exploitation 19:50 - Using metasploit to exploit Laravel and send the requests through burpsuite so we can analyze the exploit 21:30 - Analyzing the exploit, going to CyberChef to decrypt the payload 27:30 - Reverse Shell returned 31:50 - Looking at .env files to get passwords, then failing at logging into the database 33:40 - Creating a list of users on the box 36:10 - Running crackmapexec with users and the password we found 38:45 - R
Back to Top