00:00 - Intro
01:10 - Start of nmap
05:00 - Downloading and installing the deb package with dpkg, then fixing the host file
06:35 - Running wireshark when examining the unobtainium application then examining the HTTP Requests
09:25 - Proxying the unobtainium app through Burpsuite by creating a new proxy listener and updating the host file
10:40 - Playing with the LFI on /todo and discovering we can only cause errors or include files in the local directory
12:30 - Using FFUF to attempt to find other JS Files with this LFI
14:50 - Copying the source code and looking for vulnerabilities
15:50 - Discovering hard coded credentials, examining the administrator password to see there would be too much entropy to bruteforce
17:45 - Analyzing the upload functionality to discover an RCE if we can upload
19:40 - Discovering a merge command and looking up Prototype Pollution to potentially update our user object with the upload permission
23:55 - Giving ourself the Upload Functionality then performing the RCE in Upload
25:53 - Ping works, now lets get a reverse shell
28:15 - Reverse shell returned, confirming we are in kubernetes downloading peirates and kubectl
32:49 - Using kubectl to do basic enumeration of kubernetes, switching our namespace then listing pods
36:15 - Demonstrating Peirates which makes the enumeration of kubernetes easier by providing a menu to list/switch namespaces and get pods
38:15 - Exploiting the same application in dev which gets us a different kubernetes token
41:15 - Doing the enumeration with kubectl again but this time we can utilize the Kube-System namespace to list secrets and taking an admin token
43:45 - Using our stolen token and discovering we can create pods using kubectl auth can-i create pods -n kube-system -token=(token)
44:22 - Explaining the attack we are about to do to create a pod with host disk mounted in the pod, then doing it in Peirates
47:00 - Looking at the Peirates source code to see how the attack works
48:55 - Doing the attack manually with kubectl
52:55 - The malicious pod is created now lets go into it and look at the root disk
24 views
11
2
2 months ago 00:10:23 1
I Played HackTheBox For 30 Days - Here’s What I Learned
5 months ago 00:00:00 1
Хакерство для всех: понятные инструкции для начинающих | Иван Глинкин HydrAttack
7 months ago 00:04:06 1
Решаем “Тред Ариадны“ | TINKOFF CTF 2024 | EASY
7 months ago 00:32:44 18
HackTheBox - Analytics
7 months ago 00:34:38 2
HackTheBox - Manager
7 months ago 01:27:34 5
HackTheBox - AppSanity
7 months ago 00:37:18 6
HackTheBox - CozyHosting
7 months ago 00:41:25 5
HackTheBox - Visual
7 months ago 01:46:13 2
HackTheBox - Drive
7 months ago 01:12:42 4
HackTheBox - Builder
7 months ago 00:26:29 1
HackTheBox - Keeper
7 months ago 02:06:46 2
HackTheBox RegistryTwo
7 months ago 00:54:43 11
HackTheBox - Clicker
7 months ago 02:05:30 1
HackTheBox - Bookworm
8 months ago 00:33:44 1
Best Hacking Laptop 2023
8 months ago 00:27:16 1
Top Hacking Books for 2023
8 months ago 00:30:39 1
Прохождение Linux-машины средней сложности SANDWORM HackTheBox | КАК ПРОЙТИ
9 months ago 11:21:04 1
Bug Bounty Course 2024 Updated
10 months ago 05:30:24 3
George Hotz | Programming | Hack The Box | ctf practice for skill (should tomcr00se return?)
10 months ago 01:02:06 16
HackTheBox Zipping
10 months ago 00:16:21 18
HackTheBox - Sau
10 months ago 02:09:39 15
HackTheBox - Coder
11 months ago 00:29:19 2
Прохождение Linux-машины средней сложности SURVEILLANCE HackTheBox | КАК ПРОЙТИ