This HackTheBox is owned by team ErrOr SquaD @prial261 with the score 700 out of 1200. It means there are more 5 vulnerabilities which are not discovered. We are throwing it as an public challenge to all members. Our aim to is making an opportunity for study and to share knowledge.
By The Way congratulations Team ErrOr SquaD
HackTheBox: http://178.128.30.125
Discovered Vulnerabilities by ErrOr SquaD
SQL Challenge 0x10
SQL Challenge 0x20
XSS Challenge 0x00
XSS Challenge 0x10
Boolean-based blind SQL Injection
Union Based Sql Injection
Pingback Attack
FAQ
Question: I saw you guys arranged HackTheBox at Daffodil International University. Why don’t you guys announce it first?
Ans: Yeah… we just worked as Tech Support. The program is organized by a company. Hope you understand.
I think others should try 1st . Then I will share POC with you guys
TIPS :- Fun part of this challenge is doing everything manually . If you use automate tools I think it will miss the hidden parts and also no fun with it . Only Firefox browser is enough to solve most of issues
Judge told not to use Burp . I thought it applies on both burp free and pro . And Most of time I use Burp’s Repeater/Intruder tabs only . I don’t believe on the scanners and never take a look on those results -_-
Almost 90% are false reports and not exploitable .
This is enough to prove we can create files on server side . Now If a attacker can get the server root path then he can upload a web php shell to get access to the server and do whatever he want .
Using load_file I was able to read some really interesting files on server system what will be useful for various attacks :-
https://pastebin.com/TuHvKpBi
I was able to read systems logs/configuration and many other files :-
What you are calling unnecessary stuffs that I call clean work . As you can see I am using browser most of time to reproduce so those unnecessary stuffs will make the output look good and easy to understand .
Someone said :- If you can’t make it good then make it look good