HackTheBox - Traverxec

01:00 - Running nmap against the box, port 80 is running a unique webserver (nostromo) 03:00 - Lets check out the website before we throw any exploits 06:37 - Launching metasploit then exploting Nostromo but sending the exploit through burpsuite to see what it is doing 10:34 - Code Execution worked, for some reason the proxies command didn’t work the first time 11:18 - Explaining why the script does a GET request before throughing an exploit (Exploit Verification) 13:40 - Editing the payload to send a Bash Reverse Shell 15:40 - Running LinPEAS 17:20 - Running LinEnum in Thorough mode 19:22 - Going over LinPEAS Output 22:16 - Going over LinEnum Output 23:00 - Discovering a HTPASSWD Password, then using hashcat to crack it 26:45 - Looking at the HTTP Configuration file to discover public_www directory in home directories 27:30 - Explaining Linux Permissions on Directories and why we can do a ls in /home/david/public_www but not /home/david/ 29:50 - Discovering an encr
Back to Top