mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/hacking-blogposts.git
synced 2025-05-16 04:16:59 +00:00
fix references
This commit is contained in:
parent
fd1fec5663
commit
8e4e47a9d8
16 changed files with 19 additions and 27 deletions
|
@ -182,7 +182,7 @@ and in doc/error_codes.pdf we are hinted towards the error codes we saw on the L
|
|||
|
||||

|
||||
|
||||
So we know that the password to login as administrator on the platform is the serial number, which is why we need to enumerate our snmp service further and just like on the [ Sneaky](7.html) Box we'll use snmpwalk:
|
||||
So we know that the password to login as administrator on the platform is the serial number, which is why we need to enumerate our snmp service further and just like on the [ Sneaky](7.md) Box we'll use snmpwalk:
|
||||
|
||||
|
||||
{Ø} nothing [ 10.10.14.24/23 ] [~/_HTB/Carrier]
|
||||
|
|
|
@ -266,7 +266,7 @@ Here we see something interesting which is that the Gitlab Login link is in fact
|
|||
javascript:(function(){ var _0x4b18=["\x76\x61\x6C\x75\x65","\x75\x73\x65\x72\x5F\x6C\x6F\x67\x69\x6E","\x67\x65\x74\x45\x6C\x65\x6D\x65\x6E\x74\x42\x79\x49\x64","\x63\x6C\x61\x76\x65","\x75\x73\x65\x72\x5F\x70\x61\x73\x73\x77\x6F\x72\x64","\x31\x31\x64\x65\x73\x30\x30\x38\x31\x78"];document[_0x4b18[2]](_0x4b18[1])[_0x4b18[0]]= _0x4b18[3];document[_0x4b18[2]](_0x4b18[4])[_0x4b18[0]]= _0x4b18[5]; })()
|
||||
|
||||
|
||||
Which seems to be some javascript obfuscated code, so we can use some [javascript prettifier](beautifier.io) to make it readable, but we can do the same from inside our terminal using vim's :%s function
|
||||
Which seems to be some javascript obfuscated code, so we can use some [javascript prettifier](https://beautifier.io) to make it readable, but we can do the same from inside our terminal using vim's :%s function
|
||||
|
||||
|
||||
:%s/;/\r/g
|
||||
|
|
|
@ -217,7 +217,7 @@ Now scrolling down, we see that we have a hint towards a java command that's bei
|
|||
|
||||

|
||||
|
||||
In this giant java process being ran by root, we are hinted towards a **java debugging wire protocol** service, and it probably doesn't require any authentication. We also see that it listens on the local port **8000** , but probably only accepts localhost connections, so we're going to use a [SSH tunnel](../Tools/sshtunnels.html) to port forward the remote port 8000 to our local machine on port **8000** :
|
||||
In this giant java process being ran by root, we are hinted towards a **java debugging wire protocol** service, and it probably doesn't require any authentication. We also see that it listens on the local port **8000** , but probably only accepts localhost connections, so we're going to use a [SSH tunnel](../Tools/sshtunnels.md) to port forward the remote port 8000 to our local machine on port **8000** :
|
||||
|
||||
|
||||
alexa@AI:~$ netstat -tulpen
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue