0xdf.gitlab.io/2020/12/05/htb-unbalanced.html

Preview meta tags from the 0xdf.gitlab.io website.

Linked Hostnames

18

Thumbnail

Search Engine Appearance

Google

https://0xdf.gitlab.io/2020/12/05/htb-unbalanced.html

HTB: Unbalanced

Unbalanced starts with a Squid proxy and RSync. I’ll use RSync to pull back the files that underpin an Encrypted Filesystem (EncFS) instance, and crack the password to gain access to the backup config files. In those files I’ll find the Squid config, which includes the internal site names, as well as the creds to manage the Squid. Looking at the proxy stats, I can find two internal IPs, and guess the existence of a third, which is currently out of order for security fixes. In the site on the third IP, I’ll find XPath injection allowing me to leak a bunch of usernames and passwords, one of which provides SSH access to the host. I’ll exploit into a Pi-Hole container using an exploit to upload a webshell, and find a script which contains the root creds for the host. In Beyond Root, I’ll look at why the searchsploit version of the PiHole exploit didn’t work.



Bing

HTB: Unbalanced

https://0xdf.gitlab.io/2020/12/05/htb-unbalanced.html

Unbalanced starts with a Squid proxy and RSync. I’ll use RSync to pull back the files that underpin an Encrypted Filesystem (EncFS) instance, and crack the password to gain access to the backup config files. In those files I’ll find the Squid config, which includes the internal site names, as well as the creds to manage the Squid. Looking at the proxy stats, I can find two internal IPs, and guess the existence of a third, which is currently out of order for security fixes. In the site on the third IP, I’ll find XPath injection allowing me to leak a bunch of usernames and passwords, one of which provides SSH access to the host. I’ll exploit into a Pi-Hole container using an exploit to upload a webshell, and find a script which contains the root creds for the host. In Beyond Root, I’ll look at why the searchsploit version of the PiHole exploit didn’t work.



DuckDuckGo

https://0xdf.gitlab.io/2020/12/05/htb-unbalanced.html

HTB: Unbalanced

Unbalanced starts with a Squid proxy and RSync. I’ll use RSync to pull back the files that underpin an Encrypted Filesystem (EncFS) instance, and crack the password to gain access to the backup config files. In those files I’ll find the Squid config, which includes the internal site names, as well as the creds to manage the Squid. Looking at the proxy stats, I can find two internal IPs, and guess the existence of a third, which is currently out of order for security fixes. In the site on the third IP, I’ll find XPath injection allowing me to leak a bunch of usernames and passwords, one of which provides SSH access to the host. I’ll exploit into a Pi-Hole container using an exploit to upload a webshell, and find a script which contains the root creds for the host. In Beyond Root, I’ll look at why the searchsploit version of the PiHole exploit didn’t work.

  • General Meta Tags

    10
    • title
      HTB: Unbalanced | 0xdf hacks stuff
    • name
      HTB: Unbalanced
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • viewport
      width=device-width, initial-scale=1
  • Open Graph Meta Tags

    7
    • og:title
      HTB: Unbalanced
    • US country flagog:locale
      en_US
    • og:description
      Unbalanced starts with a Squid proxy and RSync. I’ll use RSync to pull back the files that underpin an Encrypted Filesystem (EncFS) instance, and crack the password to gain access to the backup config files. In those files I’ll find the Squid config, which includes the internal site names, as well as the creds to manage the Squid. Looking at the proxy stats, I can find two internal IPs, and guess the existence of a third, which is currently out of order for security fixes. In the site on the third IP, I’ll find XPath injection allowing me to leak a bunch of usernames and passwords, one of which provides SSH access to the host. I’ll exploit into a Pi-Hole container using an exploit to upload a webshell, and find a script which contains the root creds for the host. In Beyond Root, I’ll look at why the searchsploit version of the PiHole exploit didn’t work.
    • og:url
      https://0xdf.gitlab.io/2020/12/05/htb-unbalanced.html
    • og:site_name
      0xdf hacks stuff
  • Twitter Meta Tags

    2
    • twitter:card
      summary
    • twitter:site
      @0xdf_
  • Link Tags

    11
    • alternate
      https://0xdf.gitlab.io/feed.xml
    • canonical
      https://0xdf.gitlab.io/2020/12/05/htb-unbalanced.html
    • icon
      /assets/icons/favicon-32x32.png
    • icon
      /assets/icons/favicon-16x16.png
    • stylesheet
      /assets/css/bootstrap-toc.min.css

Emails

1

Links

58