HackTheBox Giddy Walkthrough | SQL Injection & Golang exe Privilege Escalation

Опубликовано: 22 Январь 2025
на канале: I.T Security Labs
536
17

Welcome to my detailed walkthrough of the HackTheBox machine "Giddy"! In this video, I will guide you through the entire process of exploiting this Windows-based machine, from initial enumeration to gaining root access.
Key Steps Covered:
1) Enumeration: Using tools like Nmap and Gobuster to identify open ports and directories.
2) SQL Injection: Exploiting a SQL injection vulnerability to capture NTLMv2 hashes.
3) Hash Cracking: Using John the Ripper to crack the captured hashes and retrieve user credentials.
4) Initial Access: Logging in via PowerShell Web Access with the cracked credentials.
5) Privilege Escalation: Crafting a Golang binary to exploit a vulnerability in Ubiquiti UniFi Video for privilege escalation.

**This is for educational purposes only ***