
0xdf.gitlab.io/2019/01/26/htb-reddish.html
Preview meta tags from the 0xdf.gitlab.io website.
Linked Hostnames
17- 19 links to0xdf.gitlab.io
- 4 links toapp.hackthebox.com
- 2 links toyoutube.com
- 1 link togithub.com
- 1 link togitlab.com
- 1 link tohackthebox.com
- 1 link toinfosec.exchange
- 1 link tolinux.die.net
Search Engine Appearance
HTB: Reddish
Reddish is one of my favorite boxes on HTB. The exploitation wasn’t that difficult, but it required tunneling communications through multiple networks, and operate in bare-bones environments without the tools I’ve come to expect. Reddish was initially released as a medium difficulty (30 point) box, and after the initial user blood took 9.5 hours, and root blood took 16.5 hours, it was raised to hard (40). Later, it was upped again to insane (50). To get root on this box, I’ll start with an instance of node-red, a javascript browser-based editor to set up flows for IoT. I’ll use that to get a remote shell into a container. From there I’ll pivot using three other containers, escalating privilege in one, before eventually ending up in the host system. Throughout this process, I’ll only have connectivity to the initial container, so I’ll have to maintain tunnels for communication.
Bing
HTB: Reddish
Reddish is one of my favorite boxes on HTB. The exploitation wasn’t that difficult, but it required tunneling communications through multiple networks, and operate in bare-bones environments without the tools I’ve come to expect. Reddish was initially released as a medium difficulty (30 point) box, and after the initial user blood took 9.5 hours, and root blood took 16.5 hours, it was raised to hard (40). Later, it was upped again to insane (50). To get root on this box, I’ll start with an instance of node-red, a javascript browser-based editor to set up flows for IoT. I’ll use that to get a remote shell into a container. From there I’ll pivot using three other containers, escalating privilege in one, before eventually ending up in the host system. Throughout this process, I’ll only have connectivity to the initial container, so I’ll have to maintain tunnels for communication.
DuckDuckGo

HTB: Reddish
Reddish is one of my favorite boxes on HTB. The exploitation wasn’t that difficult, but it required tunneling communications through multiple networks, and operate in bare-bones environments without the tools I’ve come to expect. Reddish was initially released as a medium difficulty (30 point) box, and after the initial user blood took 9.5 hours, and root blood took 16.5 hours, it was raised to hard (40). Later, it was upped again to insane (50). To get root on this box, I’ll start with an instance of node-red, a javascript browser-based editor to set up flows for IoT. I’ll use that to get a remote shell into a container. From there I’ll pivot using three other containers, escalating privilege in one, before eventually ending up in the host system. Throughout this process, I’ll only have connectivity to the initial container, so I’ll have to maintain tunnels for communication.
General Meta Tags
9- titleHTB: Reddish | 0xdf hacks stuff
- nameHTB: Reddish
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1
Open Graph Meta Tags
6- og:titleHTB: Reddish
og:locale
en_US- og:descriptionReddish is one of my favorite boxes on HTB. The exploitation wasn’t that difficult, but it required tunneling communications through multiple networks, and operate in bare-bones environments without the tools I’ve come to expect. Reddish was initially released as a medium difficulty (30 point) box, and after the initial user blood took 9.5 hours, and root blood took 16.5 hours, it was raised to hard (40). Later, it was upped again to insane (50). To get root on this box, I’ll start with an instance of node-red, a javascript browser-based editor to set up flows for IoT. I’ll use that to get a remote shell into a container. From there I’ll pivot using three other containers, escalating privilege in one, before eventually ending up in the host system. Throughout this process, I’ll only have connectivity to the initial container, so I’ll have to maintain tunnels for communication.
- og:urlhttps://0xdf.gitlab.io/2019/01/26/htb-reddish.html
- og:site_name0xdf hacks stuff
Twitter Meta Tags
2- twitter:cardsummary
- twitter:site@0xdf_
Link Tags
11- alternatehttps://0xdf.gitlab.io/feed.xml
- canonicalhttps://0xdf.gitlab.io/2019/01/26/htb-reddish.html
- icon/assets/icons/favicon-32x32.png
- icon/assets/icons/favicon-16x16.png
- stylesheet/assets/css/bootstrap-toc.min.css
Emails
1Links
39- http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://0xdf.gitlab.io
- https://0xdf.gitlab.io/2018/06/10/intro-to-ssh-tunneling.html
- https://0xdf.gitlab.io/2019/01/26/htb-reddish.html
- https://0xdf.gitlab.io/about