{"id":323,"date":"2019-02-17T06:38:52","date_gmt":"2019-02-17T06:38:52","guid":{"rendered":"https:\/\/zineausa.com\/blog\/?p=323"},"modified":"2020-02-05T19:20:05","modified_gmt":"2020-02-05T19:20:05","slug":"hackthebox-ypuffy-writeup","status":"publish","type":"post","link":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/","title":{"rendered":"Hackthebox \u2013 Ypuffy Writeup"},"content":{"rendered":"\n<p>This is a write-up for the Ypuffy machine on hackthebox.eu which was retired on 2\/9\/19! <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 1: Enumeration<\/h2>\n\n\n\n<p>Like usual, let&#8217;s start with a quick nmap to see what ports are open:<\/p>\n\n\n\n<p class=\"code\">nmap -sC -sV -oA nmap1.txt -Pn 10.10.10.107<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"883\" height=\"659\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-2.png\" alt=\"\" class=\"wp-image-326\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-2.png 883w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-2-600x448.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-2-300x224.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-2-768x573.png 768w\" sizes=\"auto, (max-width: 883px) 100vw, 883px\" \/><\/figure>\n\n\n\n<p>First we attempt to browse to port 80 like usual, but we get a &#8220;the connection was reset&#8221; error:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"922\" height=\"530\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-1.png\" alt=\"\" class=\"wp-image-325\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-1.png 922w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-1-600x345.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-1-300x172.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-1-768x441.png 768w\" sizes=\"auto, (max-width: 922px) 100vw, 922px\" \/><figcaption><br><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Step 2: Getting User Flag<\/h2>\n\n\n\n<p>The nmap indicated port 389 was open with &#8220;anonymous bind ok&#8221;, so we google that and find this article:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.splunk.com\/blog\/2009\/07\/30\/ldapsearch-is-your-friend.html\">https:\/\/www.splunk.com\/blog\/2009\/07\/30\/ldapsearch-is-your-friend.html<\/a><\/p>\n\n\n\n<p>Based on the article above, and the nmap results, we run the following command to enumerate ldap:<\/p>\n\n\n\n<p>ldapsearch -h 10.10.10.107 -p 389 -x -b &#8220;dc=hackthebox,dc=htb&#8221;<\/p>\n\n\n\n<p>We get a lot of output, including the following lines:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"713\" height=\"366\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-3.png\" alt=\"\" class=\"wp-image-327\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-3.png 713w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-3-600x308.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-3-300x154.png 300w\" sizes=\"auto, (max-width: 713px) 100vw, 713px\" \/><\/figure>\n\n\n\n<p>SambaNTPassword looks promising so let&#8217;s try to list samba shares with that:<\/p>\n\n\n\n<p class=\"code\">smbclient &#8211;pw-nt-hash -U alice1978%0B186E661BBDBDCF6047784DE8B9FD8B -L 10.10.10.107<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"992\" height=\"268\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-4.png\" alt=\"\" class=\"wp-image-328\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-4.png 992w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-4-600x162.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-4-300x81.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-4-768x207.png 768w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\" \/><\/figure>\n\n\n\n<p>Nice, that got us some shares so let&#8217;s mount the alice share with:<\/p>\n\n\n\n<p class=\"code\">smbclient &#8211;pw-nt-hash -U alice1978%0B186E661BBDBDCF6047784DE8B9FD8B \/\/10.10.10.107\/alice<\/p>\n\n\n\n<p>Type ls to see the files on the server, then we use the &#8220;lcd&#8221; command to change the local directory on our kali machine, and then we use the &#8220;get&#8221; command to download the file like so:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"163\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-5-1024x163.png\" alt=\"\" class=\"wp-image-329\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-5-1024x163.png 1024w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-5-600x96.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-5-300x48.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-5-768x123.png 768w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-5.png 1046w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Now, back on the local machine let&#8217;s convert this to a key we can SSH with using:<\/p>\n\n\n\n<p class=\"code\">puttygen my_private_key.ppk -O private-openssh -o alice.key<\/p>\n\n\n\n<p>Then, let&#8217;s SSH in with the key we just got:<\/p>\n\n\n\n<p class=\"code\">ssh alice1978@10.10.10.107 -i alice.key<\/p>\n\n\n\n<p>This gets us the user flag!<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"271\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-6.png\" alt=\"\" class=\"wp-image-330\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-6.png 644w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-6-600x252.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-6-300x126.png 300w\" sizes=\"auto, (max-width: 644px) 100vw, 644px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Step 3: Getting Root flag<\/h2>\n\n\n\n<p><strong><u>Intended way:<\/u><\/strong><\/p>\n\n\n\n<p>So this is an OpenBSD system and the sudo equivalent here is &#8220;doas&#8221;, so we take a look at the \/etc\/doas.conf file to see that we have access to run \/usr\/bin\/ssh-keygen as userca:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"524\" height=\"56\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-7.png\" alt=\"\" class=\"wp-image-331\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-7.png 524w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-7-300x32.png 300w\" sizes=\"auto, (max-width: 524px) 100vw, 524px\" \/><\/figure>\n\n\n\n<p>Since this is related to ssh, let&#8217;s take a look at the SSH config file at \/etc\/ssh\/sshd_conf<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cat \/etc\/ssh\/sshd_config<\/code><\/pre>\n\n\n\n<p>We see an interesting line here, which seems to relate to the automated authorization of ssh keys! let&#8217;s see if we can exploit this.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"931\" height=\"165\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-8.png\" alt=\"\" class=\"wp-image-332\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-8.png 931w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-8-600x106.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-8-300x53.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-8-768x136.png 768w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/><\/figure>\n\n\n\n<p>Don&#8217;t be afraid to try urls, so let&#8217;s try that second command with the username root:<\/p>\n\n\n\n<p class=\"code\">curl &#8216;http:\/\/127.0.0.1\/sshauth?type=principals&amp;username=root&#8217;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"681\" height=\"54\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-12.png\" alt=\"\" class=\"wp-image-336\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-12.png 681w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-12-600x48.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-12-300x24.png 300w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/figure>\n\n\n\n<p>Interesting, that looks like a password to me.<br><br><\/p>\n\n\n\n<p>Seems like we will need to generate a ssh key first, so let&#8217;s run ssh-keygen:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"759\" height=\"394\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-13.png\" alt=\"\" class=\"wp-image-337\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-13.png 759w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-13-600x311.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-13-300x156.png 300w\" sizes=\"auto, (max-width: 759px) 100vw, 759px\" \/><figcaption><br><\/figcaption><\/figure>\n\n\n\n<p>Now, let&#8217;s use that SSH key as an input to the doas command we discovered earlier to generate key with the root password:<\/p>\n\n\n\n<p class=\"code\">doas -u userca \/usr\/bin\/ssh-keygen -s \/home\/userca\/ca -I test -n 3m3rgencyB4ckd00r \/tmp\/test<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"932\" height=\"33\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-14.png\" alt=\"\" class=\"wp-image-338\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-14.png 932w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-14-600x21.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-14-300x11.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-14-768x27.png 768w\" sizes=\"auto, (max-width: 932px) 100vw, 932px\" \/><\/figure>\n\n\n\n<p>Now, let&#8217;s use this pub key as the authorized keys file and then ssh in as root@localhost, which gets us the root flag!<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"637\" height=\"323\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-15.png\" alt=\"\" class=\"wp-image-339\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-15.png 637w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-15-600x304.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-15-300x152.png 300w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/figure>\n\n\n\n<p><strong><u>The way we did it the first time (unintended easy way):<\/u><\/strong><\/p>\n\n\n\n<p>Let&#8217;s check the kernel:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"496\" height=\"41\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-9.png\" alt=\"\" class=\"wp-image-333\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-9.png 496w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-9-300x25.png 300w\" sizes=\"auto, (max-width: 496px) 100vw, 496px\" \/><\/figure>\n\n\n\n<p>We google for openbsd 6.3 exploits and click the second <a href=\"https:\/\/github.com\/0xdea\/exploits\/blob\/master\/openbsd\/raptor_xorgasm\">result<\/a>:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"771\" height=\"354\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-10.png\" alt=\"\" class=\"wp-image-334\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-10.png 771w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-10-600x275.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-10-300x138.png 300w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-10-768x353.png 768w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/figure>\n\n\n\n<p>We copy the exploit to the machine with into the tmp folder with vim and paste it in and save it as test.py<\/p>\n\n\n\n<p>Now we chmod +x test.py to make sure it is executable and run the exploit with:<\/p>\n\n\n\n<p class=\"code\">.\/test.py<\/p>\n\n\n\n<p>Wait a few minutes and we have the root flag:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"688\" height=\"617\" src=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-11.png\" alt=\"\" class=\"wp-image-335\" srcset=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-11.png 688w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-11-600x538.png 600w, https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/image-11-300x269.png 300w\" sizes=\"auto, (max-width: 688px) 100vw, 688px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>This is a write-up for the Ypuffy machine on hackthebox.eu which was retired on 2\/9\/19! Step 1: Enumeration Like usual, let&#8217;s start with a quick nmap to see what ports are open: nmap -sC -sV -oA nmap1.txt -Pn 10.10.10.107 First we attempt to browse to port 80 like usual, but we get a &#8220;the connection [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":574,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,6],"tags":[],"class_list":["post-323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackthebox","category-writeups"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackthebox \u2013 Ypuffy Writeup - Zinea InfoSec Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackthebox \u2013 Ypuffy Writeup - Zinea InfoSec Blog\" \/>\n<meta property=\"og:description\" content=\"This is a write-up for the Ypuffy machine on hackthebox.eu which was retired on 2\/9\/19! Step 1: Enumeration Like usual, let&#8217;s start with a quick nmap to see what ports are open: nmap -sC -sV -oA nmap1.txt -Pn 10.10.10.107 First we attempt to browse to port 80 like usual, but we get a &#8220;the connection [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/\" \/>\n<meta property=\"og:site_name\" content=\"Zinea InfoSec Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/zineausa\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-17T06:38:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-05T19:20:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/0.png\" \/>\n\t<meta property=\"og:image:width\" content=\"597\" \/>\n\t<meta property=\"og:image:height\" content=\"377\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Zinea\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ZineaLLC\" \/>\n<meta name=\"twitter:site\" content=\"@ZineaLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zinea\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/\"},\"author\":{\"name\":\"Zinea\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3c58d4f0650f7fb571c01fcf836b1d0\"},\"headline\":\"Hackthebox \u2013 Ypuffy Writeup\",\"datePublished\":\"2019-02-17T06:38:52+00:00\",\"dateModified\":\"2020-02-05T19:20:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/\"},\"wordCount\":549,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/0.png\",\"articleSection\":[\"HackTheBox\",\"Writeups\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/\",\"name\":\"Hackthebox \u2013 Ypuffy Writeup - Zinea InfoSec Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/0.png\",\"datePublished\":\"2019-02-17T06:38:52+00:00\",\"dateModified\":\"2020-02-05T19:20:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/0.png\",\"contentUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/0.png\",\"width\":597,\"height\":377},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/2019\\\/02\\\/hackthebox-ypuffy-writeup\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackthebox \u2013 Ypuffy Writeup\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/\",\"name\":\"Zinea InfoSec Blog\",\"description\":\"Cyber Security Resources\",\"publisher\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#organization\",\"name\":\"Zinea LLC\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/zinea-square.png\",\"contentUrl\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/zinea-square.png\",\"width\":876,\"height\":876,\"caption\":\"Zinea LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/zineausa\\\/\",\"https:\\\/\\\/x.com\\\/ZineaLLC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zineausa.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3c58d4f0650f7fb571c01fcf836b1d0\",\"name\":\"Zinea\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g\",\"caption\":\"Zinea\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackthebox \u2013 Ypuffy Writeup - Zinea InfoSec Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/","og_locale":"en_US","og_type":"article","og_title":"Hackthebox \u2013 Ypuffy Writeup - Zinea InfoSec Blog","og_description":"This is a write-up for the Ypuffy machine on hackthebox.eu which was retired on 2\/9\/19! Step 1: Enumeration Like usual, let&#8217;s start with a quick nmap to see what ports are open: nmap -sC -sV -oA nmap1.txt -Pn 10.10.10.107 First we attempt to browse to port 80 like usual, but we get a &#8220;the connection [&hellip;]","og_url":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/","og_site_name":"Zinea InfoSec Blog","article_publisher":"https:\/\/www.facebook.com\/zineausa\/","article_published_time":"2019-02-17T06:38:52+00:00","article_modified_time":"2020-02-05T19:20:05+00:00","og_image":[{"width":597,"height":377,"url":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/0.png","type":"image\/png"}],"author":"Zinea","twitter_card":"summary_large_image","twitter_creator":"@ZineaLLC","twitter_site":"@ZineaLLC","twitter_misc":{"Written by":"Zinea","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/#article","isPartOf":{"@id":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/"},"author":{"name":"Zinea","@id":"https:\/\/zineausa.com\/blog\/#\/schema\/person\/e3c58d4f0650f7fb571c01fcf836b1d0"},"headline":"Hackthebox \u2013 Ypuffy Writeup","datePublished":"2019-02-17T06:38:52+00:00","dateModified":"2020-02-05T19:20:05+00:00","mainEntityOfPage":{"@id":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/"},"wordCount":549,"commentCount":0,"publisher":{"@id":"https:\/\/zineausa.com\/blog\/#organization"},"image":{"@id":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/#primaryimage"},"thumbnailUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/0.png","articleSection":["HackTheBox","Writeups"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/","url":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/","name":"Hackthebox \u2013 Ypuffy Writeup - Zinea InfoSec Blog","isPartOf":{"@id":"https:\/\/zineausa.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/#primaryimage"},"image":{"@id":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/#primaryimage"},"thumbnailUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/0.png","datePublished":"2019-02-17T06:38:52+00:00","dateModified":"2020-02-05T19:20:05+00:00","breadcrumb":{"@id":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/#primaryimage","url":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/0.png","contentUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2019\/02\/0.png","width":597,"height":377},{"@type":"BreadcrumbList","@id":"https:\/\/zineausa.com\/blog\/2019\/02\/hackthebox-ypuffy-writeup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/zineausa.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackthebox \u2013 Ypuffy Writeup"}]},{"@type":"WebSite","@id":"https:\/\/zineausa.com\/blog\/#website","url":"https:\/\/zineausa.com\/blog\/","name":"Zinea InfoSec Blog","description":"Cyber Security Resources","publisher":{"@id":"https:\/\/zineausa.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zineausa.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zineausa.com\/blog\/#organization","name":"Zinea LLC","url":"https:\/\/zineausa.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zineausa.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/05\/zinea-square.png","contentUrl":"https:\/\/zineausa.com\/blog\/wp-content\/uploads\/2018\/05\/zinea-square.png","width":876,"height":876,"caption":"Zinea LLC"},"image":{"@id":"https:\/\/zineausa.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/zineausa\/","https:\/\/x.com\/ZineaLLC"]},{"@type":"Person","@id":"https:\/\/zineausa.com\/blog\/#\/schema\/person\/e3c58d4f0650f7fb571c01fcf836b1d0","name":"Zinea","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81f66095634a4c974693824dc72cd0db7c7c44910d60dda2d1bf1be275ee107d?s=96&d=mm&r=g","caption":"Zinea"}}]}},"_links":{"self":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts\/323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":3,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts\/323\/revisions"}],"predecessor-version":[{"id":575,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/posts\/323\/revisions\/575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/media\/574"}],"wp:attachment":[{"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/media?parent=323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/categories?post=323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zineausa.com\/blog\/wp-json\/wp\/v2\/tags?post=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}