0xdf.gitlab.io/2020/02/22/htb-zetta.html

Preview meta tags from the 0xdf.gitlab.io website.

Linked Hostnames

19

Thumbnail

Search Engine Appearance

Google

https://0xdf.gitlab.io/2020/02/22/htb-zetta.html

HTB: Zetta

Zetta starts off different from the start, using FTP Bounce attacks to identify the IPv6 address of the box, and then finding RSync listening on IPv6 only. I’ll use limited RSync access to get the size of a user’s password, and then brute force it to get access to the roy home directory, where I can write my key to the authorized keys file to get SSH access. I’ll escalate to the postgres user with an SQL injection into Syslog, where the box author cleverly uses Git to show the config but not the most recent password. Finally, I’ll recover the password for root using some logic and the postgres user’s password. In Beyond Root, I’ll look at the authentication for the FTP server that allowed any 32 character user with the username as the password, dig into the RSync config, and look at the bits of the Syslog config that were hidden from me.



Bing

HTB: Zetta

https://0xdf.gitlab.io/2020/02/22/htb-zetta.html

Zetta starts off different from the start, using FTP Bounce attacks to identify the IPv6 address of the box, and then finding RSync listening on IPv6 only. I’ll use limited RSync access to get the size of a user’s password, and then brute force it to get access to the roy home directory, where I can write my key to the authorized keys file to get SSH access. I’ll escalate to the postgres user with an SQL injection into Syslog, where the box author cleverly uses Git to show the config but not the most recent password. Finally, I’ll recover the password for root using some logic and the postgres user’s password. In Beyond Root, I’ll look at the authentication for the FTP server that allowed any 32 character user with the username as the password, dig into the RSync config, and look at the bits of the Syslog config that were hidden from me.



DuckDuckGo

https://0xdf.gitlab.io/2020/02/22/htb-zetta.html

HTB: Zetta

Zetta starts off different from the start, using FTP Bounce attacks to identify the IPv6 address of the box, and then finding RSync listening on IPv6 only. I’ll use limited RSync access to get the size of a user’s password, and then brute force it to get access to the roy home directory, where I can write my key to the authorized keys file to get SSH access. I’ll escalate to the postgres user with an SQL injection into Syslog, where the box author cleverly uses Git to show the config but not the most recent password. Finally, I’ll recover the password for root using some logic and the postgres user’s password. In Beyond Root, I’ll look at the authentication for the FTP server that allowed any 32 character user with the username as the password, dig into the RSync config, and look at the bits of the Syslog config that were hidden from me.

  • General Meta Tags

    10
    • title
      HTB: Zetta | 0xdf hacks stuff
    • name
      HTB: Zetta
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • viewport
      width=device-width, initial-scale=1
  • Open Graph Meta Tags

    7
    • og:title
      HTB: Zetta
    • US country flagog:locale
      en_US
    • og:description
      Zetta starts off different from the start, using FTP Bounce attacks to identify the IPv6 address of the box, and then finding RSync listening on IPv6 only. I’ll use limited RSync access to get the size of a user’s password, and then brute force it to get access to the roy home directory, where I can write my key to the authorized keys file to get SSH access. I’ll escalate to the postgres user with an SQL injection into Syslog, where the box author cleverly uses Git to show the config but not the most recent password. Finally, I’ll recover the password for root using some logic and the postgres user’s password. In Beyond Root, I’ll look at the authentication for the FTP server that allowed any 32 character user with the username as the password, dig into the RSync config, and look at the bits of the Syslog config that were hidden from me.
    • og:url
      https://0xdf.gitlab.io/2020/02/22/htb-zetta.html
    • og:site_name
      0xdf hacks stuff
  • Twitter Meta Tags

    2
    • twitter:card
      summary
    • twitter:site
      @0xdf_
  • Link Tags

    11
    • alternate
      https://0xdf.gitlab.io/feed.xml
    • canonical
      https://0xdf.gitlab.io/2020/02/22/htb-zetta.html
    • icon
      /assets/icons/favicon-32x32.png
    • icon
      /assets/icons/favicon-16x16.png
    • stylesheet
      /assets/css/bootstrap-toc.min.css

Emails

1

Links

44