
0xdf.gitlab.io/2020/02/22/htb-zetta.html
Preview meta tags from the 0xdf.gitlab.io website.
Linked Hostnames
19- 21 links to0xdf.gitlab.io
- 3 links toapp.hackthebox.com
- 2 links togithub.com
- 2 links togitlab.com
- 2 links toyoutube.com
- 1 link to0xdfimages.gitlab.io
- 1 link toben.akrin.com
- 1 link todownload.samba.org
Thumbnail

Search Engine Appearance
HTB: Zetta
Zetta starts off different from the start, using FTP Bounce attacks to identify the IPv6 address of the box, and then finding RSync listening on IPv6 only. I’ll use limited RSync access to get the size of a user’s password, and then brute force it to get access to the roy home directory, where I can write my key to the authorized keys file to get SSH access. I’ll escalate to the postgres user with an SQL injection into Syslog, where the box author cleverly uses Git to show the config but not the most recent password. Finally, I’ll recover the password for root using some logic and the postgres user’s password. In Beyond Root, I’ll look at the authentication for the FTP server that allowed any 32 character user with the username as the password, dig into the RSync config, and look at the bits of the Syslog config that were hidden from me.
Bing
HTB: Zetta
Zetta starts off different from the start, using FTP Bounce attacks to identify the IPv6 address of the box, and then finding RSync listening on IPv6 only. I’ll use limited RSync access to get the size of a user’s password, and then brute force it to get access to the roy home directory, where I can write my key to the authorized keys file to get SSH access. I’ll escalate to the postgres user with an SQL injection into Syslog, where the box author cleverly uses Git to show the config but not the most recent password. Finally, I’ll recover the password for root using some logic and the postgres user’s password. In Beyond Root, I’ll look at the authentication for the FTP server that allowed any 32 character user with the username as the password, dig into the RSync config, and look at the bits of the Syslog config that were hidden from me.
DuckDuckGo

HTB: Zetta
Zetta starts off different from the start, using FTP Bounce attacks to identify the IPv6 address of the box, and then finding RSync listening on IPv6 only. I’ll use limited RSync access to get the size of a user’s password, and then brute force it to get access to the roy home directory, where I can write my key to the authorized keys file to get SSH access. I’ll escalate to the postgres user with an SQL injection into Syslog, where the box author cleverly uses Git to show the config but not the most recent password. Finally, I’ll recover the password for root using some logic and the postgres user’s password. In Beyond Root, I’ll look at the authentication for the FTP server that allowed any 32 character user with the username as the password, dig into the RSync config, and look at the bits of the Syslog config that were hidden from me.
General Meta Tags
10- titleHTB: Zetta | 0xdf hacks stuff
- nameHTB: Zetta
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1
Open Graph Meta Tags
7- og:titleHTB: Zetta
og:locale
en_US- og:descriptionZetta starts off different from the start, using FTP Bounce attacks to identify the IPv6 address of the box, and then finding RSync listening on IPv6 only. I’ll use limited RSync access to get the size of a user’s password, and then brute force it to get access to the roy home directory, where I can write my key to the authorized keys file to get SSH access. I’ll escalate to the postgres user with an SQL injection into Syslog, where the box author cleverly uses Git to show the config but not the most recent password. Finally, I’ll recover the password for root using some logic and the postgres user’s password. In Beyond Root, I’ll look at the authentication for the FTP server that allowed any 32 character user with the username as the password, dig into the RSync config, and look at the bits of the Syslog config that were hidden from me.
- og:urlhttps://0xdf.gitlab.io/2020/02/22/htb-zetta.html
- og:site_name0xdf hacks stuff
Twitter Meta Tags
2- twitter:cardsummary
- twitter:site@0xdf_
Link Tags
11- alternatehttps://0xdf.gitlab.io/feed.xml
- canonicalhttps://0xdf.gitlab.io/2020/02/22/htb-zetta.html
- icon/assets/icons/favicon-32x32.png
- icon/assets/icons/favicon-16x16.png
- stylesheet/assets/css/bootstrap-toc.min.css
Emails
1Links
44- http://man7.org/linux/man-pages/man1/logger.1.html
- https://0xdf.gitlab.io
- https://0xdf.gitlab.io/2020/02/22/htb-zetta.html
- https://0xdf.gitlab.io/about
- https://0xdf.gitlab.io/cheatsheets