HackTheBox SolidState Walkthrough - Penetration Testing
Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people.
In this Solidstate walkthrough we will be penetration testing SolidState on HackTheBox . The goal of this pentest is to achieve unrestricted root execution by finding and exploiting security vulnerabilities. We complete this video on a Kali linux machine and use several tools network and database tools to find exploits.
Support us on Patreon: http://bit.ly/38mnveC
Discussion: https://guidedhacking.com/threads/hackthebox-solidstate-walkthrough.16225/
We will do reconnaissance with Nmap, a free and open-source (FOSS) network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system, and in this video we will use Nmap to identify the devices connected to the network and determine the services running as well as netcat to read and write to network connections.
The primary exploit we find in this hackthebox solidstate is a vulnerable James mail client. Once run Nmap reconnaissance, we show how to search for exploits with searchsploit (a command-line search tool for Exploit-DB) and find exploits for the James mail client. In this video, we will be using a Remote Command Execution vulnerability (35513).
We will explore the vulnerability write a bash completion script by opening a reverse shell and then trigger that with a SSH login. We find mindy's credentials from the mail server and log into a restricted bash shell. We then force pseudo-terminal allocation to open up a bash session with no profile and escape the restricted shell. Once we escape the restricted shell, we use g0tmi1k to try to find a privilege escalation path. We eventually find a file "/opt/tmp.py" that is owned by root and editable by Mindy. Finally, we solve this Hack The Box by using Mindy's credentials to have this file execute our reverse shell with root permissions.
Donate on our Forum : http://bit.ly/2HkOco9
Support us on Patreon : http://bit.ly/38mnveC
Follow us on Facebook : http://bit.ly/2vvHfhk
Follow us on Twitter : http://bit.ly/3bC7J1i
Follow us on Twitch : http://bit.ly/39ywOZ2
Follow us on Reddit : http://bit.ly/3bvOB57
Follow us on GitHub : http://bit.ly/2HoNXIS
Follow us on Instagram : http://bit.ly/2SoDOlu
#HackTheBox #PenetrationTesting #EthicalHacking