HackTheBox - Bitlab

01:05 - Begin of recon 01:58 - Taking a loot at the webserver and seeing a GitLab signin page 02:53 - Using wget and exiftool to check metadata on files on the server to see when stuff was uploaded 04:00 - Running gobuster, explaining why we need the Wildcard flag on this box for this tool to work 05:50 - Finding the /help directory which has some javascript that contains the password to GitLab 10:28 - Logging into Gitlab with creds from the 11:11 - Showing how to do GoBuster with a cookie (gets past the wildcard issue earlier in the video) 13:20 - Looking at snippets to see a Postgresql password 14:10 - Looking at Git Commit History of various files to see there’s a post hook to upload merges to a webserver 16:10 - Creating a New Branch on Profile, adding a webshell, then merging it to trigger it to be uploaded to the server 19:10 - CMD PHP Shell is on the server, lets get a reverse shell. 20:05 - Reverse shell returned, setting up a proper pty with rows and
Back to Top