<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Web on s4yhii&#39;s blog</title>
    <link>https://blog.s4yhii.com/tags/web/</link>
    <description>Recent content in Web on s4yhii&#39;s blog</description>
    <image>
      <title>s4yhii&#39;s blog</title>
      <url>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.155.3</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 25 Mar 2025 08:00:00 -0500</lastBuildDate>
    <atom:link href="https://blog.s4yhii.com/tags/web/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Cyber Apocalypse 2025 - 6x Web Challenges Writeup</title>
      <link>https://blog.s4yhii.com/posts/cyberapocalypse-ctf2025-web/</link>
      <pubDate>Tue, 25 Mar 2025 08:00:00 -0500</pubDate>
      <guid>https://blog.s4yhii.com/posts/cyberapocalypse-ctf2025-web/</guid>
      <description>&lt;p&gt;I participated as a member of team &lt;strong&gt;CibersecUNI&lt;/strong&gt;. This time i managed to solve all 6/6 challenges in the web category.&lt;/p&gt;
&lt;h1 id=&#34;whispers-of-the-moonbeam&#34;&gt;Whispers of the Moonbeam&lt;/h1&gt;
&lt;p&gt;Observando las funciones, nos dan una pista que se puede inyectar comandos con ;.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;alt text&#34; loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/CA2025/image-1.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Usando el comando gossip, puedo listar los archivos, se visualiza el archivo flag.txt, y con un simple ; puedo concatenar el comando cat para leer la flag.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;gossip&lt;span class=&#34;p&#34;&gt;;&lt;/span&gt; cat flag.txt
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Obtenemos la flag. 🎉
HTB{Sh4d0w_3x3cut10n_1n_Th3_M00nb34m_T4v3rn_78cb9b70be3bf077e608865b967b5ab1}&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Web Challenges</title>
      <link>https://blog.s4yhii.com/posts/2022-07-01-web-challenges-htb/</link>
      <pubDate>Fri, 01 Jul 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-07-01-web-challenges-htb/</guid>
      <description>&lt;h1 id=&#34;templated&#34;&gt;Templated&lt;/h1&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/challenges/ch0.jpg&#34;&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Dificulty: easy&lt;/li&gt;
&lt;li&gt;Description: Can you exploit this simple mistake?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;solution&#34;&gt;Solution&lt;/h2&gt;
&lt;p&gt;First we visit the site and see that uses jinja2, this template is susceptible to &lt;code&gt;SSTI attacks&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/challenges/ch1.jpg&#34;&gt;&lt;/p&gt;
&lt;p&gt;We see that the directory searched is rendered in the page with 25, so its vulnerable to SSTI.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/challenges/ch2.jpg&#34;&gt;&lt;/p&gt;
&lt;p&gt;We use the payload that will allow us to &lt;code&gt;RCE&lt;/code&gt; on the server to read the file &lt;code&gt;flag.txt&lt;/code&gt;, we extract it from &lt;a href=&#34;https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Template%20Injection/README.md#jinja2---remote-code-execution&#34;&gt;PayloadsAllTheThings&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Jarvis</title>
      <link>https://blog.s4yhii.com/posts/2021-11-15-jarvis-htb/</link>
      <pubDate>Mon, 15 Nov 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-11-15-jarvis-htb/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt;: 10.10.10.143&lt;/p&gt;
&lt;h3 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h3&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes&lt;/p&gt;
&lt;h3 id=&#34;nmap&#34;&gt;Nmap&lt;/h3&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/jarvis/nmap.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Como vemos tiene el puerto 80 abierto, que es el http,  veremos en el navegador de que se trata y analizaremos la web.&lt;/p&gt;
&lt;h3 id=&#34;wappalyzer&#34;&gt;Wappalyzer&lt;/h3&gt;
&lt;p&gt;Usando la extensión wappalizer para identificar las tecnologías usadas en la web, encontramos que la web está usando phpmyadmin version 4.8&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/jarvis/wappa.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Al hacer un poco de research encontramos la siguiente vulnerabilidad &lt;a href=&#34;https://www.exploit-db.com/exploits/50457&#34;&gt;phpMyAdmin 4.8.1 - Remote Code Execution (RCE)&lt;/a&gt; , que se aprovecha del ejecutar comandos a traves de parametros sql.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Knife</title>
      <link>https://blog.s4yhii.com/posts/2021-08-28-knife-htb/</link>
      <pubDate>Sat, 28 Aug 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-08-28-knife-htb/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt;: 10.10.10.242&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DATE&lt;/strong&gt;  : 28/08/2021&lt;/p&gt;
&lt;h2 id=&#34;matriz-de-la-maquina&#34;&gt;Matriz de la maquina&lt;/h2&gt;
&lt;p&gt;Esta matriz nos muestra las características de explotación de la maquina.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/knife/matrix.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h2&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-console&#34; data-lang=&#34;console&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;┌──(j3sm0n㉿kali)-[~]
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;└─$ nmap -sC -sV 10.10.10.242                                                                 148 ⨯ 1 ⚙
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Starting Nmap 7.91 ( https://nmap.org ) at 2021-06-07 02:03 EDT
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Nmap scan report for 10.10.10.242
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Host is up (0.11s latency).
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Not shown: 998 closed ports
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;PORT   STATE SERVICE VERSION
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.2 (Ubuntu Linux; protocol 2.0)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;| ssh-hostkey: 
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;|   3072 be:54:9c:a3:67:c3:15:c3:64:71:7f:6a:53:4a:4c:21 (RSA)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;|   256 bf:8a:3f:d4:06:e9:2e:87:4e:c9:7e:ab:22:0e:c0:ee (ECDSA)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;|_  256 1a:de:a1:cc:37:ce:53:bb:1b:fb:2b:0b:ad:b3:f6:84 (ED25519)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;|_http-server-header: Apache/2.4.41 (Ubuntu)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;|_http-title:  Emergent Medical Idea
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;err&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;go&#34;&gt;Nmap done: 1 IP address (1 host up) scanned in 23.02 seconds
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Como vemos tiene el puerto 80 abierto, que es el http,  veremos en el navegador de que se trata y analizaremos la web&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Writeup</title>
      <link>https://blog.s4yhii.com/posts/2021-07-25-writeup-htb/</link>
      <pubDate>Sun, 25 Jul 2021 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2021-07-25-writeup-htb/</guid>
      <description>&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Machine IP&lt;/strong&gt; : 10.10.10.138&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DATE&lt;/strong&gt;  : 25/07/2021&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;matriz-de-la-maquina&#34;&gt;Matriz de la maquina&lt;/h2&gt;
&lt;p&gt;Esta matriz nos muestra las características de explotación de la maquina.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/writeup/matrix.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;reconocimiento&#34;&gt;Reconocimiento&lt;/h2&gt;
&lt;p&gt;Primero hacemos un escaneo de puertos para saber cuales están abiertos y conocer sus servicios correspondientes.&lt;/p&gt;
&lt;h2 id=&#34;nmap&#34;&gt;Nmap&lt;/h2&gt;
&lt;p&gt;Usamos el siguiente comando para escanear todos los puertos de una manera rapida.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;nmap -p- --open -T5 -v -n -Pn 10.10.10.138
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Posteriormente utilizamos este comando con los puertos del anterior escaneo para saber las versiones de cada servicio.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
