{"id":774,"date":"2020-09-10T22:13:18","date_gmt":"2020-09-10T21:13:18","guid":{"rendered":"https:\/\/cybercop-training.ch\/?p=774"},"modified":"2020-09-11T10:30:12","modified_gmt":"2020-09-11T09:30:12","slug":"hack-the-box-penetration-testing-labs","status":"publish","type":"post","link":"https:\/\/cybercop-training.ch\/?p=774","title":{"rendered":"Hack The Box &#8211; Penetration Testing Labs"},"content":{"rendered":"<p>There are some really cool IT-Security training platforms on the net, where you can practice and train your skills. Today I&#8217;ll introduce one of this amazing platforms called &#171;<a href=\"https:\/\/www.hackthebox.eu\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hack The Box<\/a>&#171;. If you want to join, you can&#8217;t just sign up, you need to solve a challenge first, before they let you in. If this is a spoiler for you, then please stop and try to hack your way in first before continue with reading \ud83d\ude0e<\/p>\n<blockquote><p>Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field. Click below to hack our <a href=\"https:\/\/www.hackthebox.eu\/invite\" target=\"_blank\" rel=\"noopener noreferrer\">invite challenge<\/a>, then get started on one of our many live machines or challenges.<\/p><\/blockquote>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-779\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge1-1024x109.png\" alt=\"\" width=\"1024\" height=\"109\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge1-1024x109.png 1024w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge1-300x32.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge1-768x82.png 768w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge1.png 1224w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-780\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge2.png\" alt=\"\" width=\"439\" height=\"286\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge2.png 439w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge2-300x195.png 300w\" sizes=\"auto, (max-width: 439px) 100vw, 439px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">I don&#8217;t have much experience yet in breaking web applications, but I remember back on a time where broadband internet connections were far away and I had to dial in with a 56k modem to access and explore the internet. I&#8217;ve discovered some sites <a href=\"https:\/\/www.hackertest.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">like this one<\/a> where you had to find a way to bypass a password prompt. If you&#8217;ve solved one you did enter the next level and every new level got more difficult. Those challenges caught my attention and I had really fun to solve some of them&#8230;<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/hackertest.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-782\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/hackertest.png\" alt=\"\" width=\"635\" height=\"282\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/hackertest.png 635w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/hackertest-300x133.png 300w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/a><\/p>\n<p>Back to the invite challenge, everything starts with analyzing the source code. Browsers like firefox and chrome bring some tools by default which helps to analyze the source code of a webpage.<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-784\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge3.png\" alt=\"\" width=\"559\" height=\"181\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge3.png 559w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge3-300x97.png 300w\" sizes=\"auto, (max-width: 559px) 100vw, 559px\" \/><\/a><\/p>\n<p>There is an embedded script called &#171;inviteapi.min.js&#187; which looks interessting.<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-786\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge4.png\" alt=\"\" width=\"826\" height=\"41\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge4.png 826w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge4-300x15.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge4-768x38.png 768w\" sizes=\"auto, (max-width: 826px) 100vw, 826px\" \/><\/a><\/p>\n<p>From there we see a javascript function called &#171;makeInviteCode&#187;<\/p>\n<p>I switch over to the console window and try to activate the function &#171;makeInviteCode&#187;<\/p>\n<p><code>makeInviteCode()<\/code><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-787\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge5.png\" alt=\"\" width=\"978\" height=\"222\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge5.png 978w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge5-300x68.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge5-768x174.png 768w\" sizes=\"auto, (max-width: 978px) 100vw, 978px\" \/><\/a><\/p>\n<p>We get an encrypted text back and a hint that it is the ROT13 chiffre.<\/p>\n<p>So let&#8217;s decode that phrase:<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-788\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge6.png\" alt=\"\" width=\"718\" height=\"286\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge6.png 718w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge6-300x119.png 300w\" sizes=\"auto, (max-width: 718px) 100vw, 718px\" \/><\/a><\/p>\n<p>That&#8217;s interessting. The decoded message is &#171;In order to generate the invite code, make a POST request to \/api\/invite\/generate<\/p>\n<p>For me it took a litle while to figure out how to do that, but I could solve it, by fire up a linux terminal and use curl to send that POST request.<\/p>\n<p><code>curl -XPOST https:\/\/www.hackthebox.eu\/api\/invite\/generate<\/code><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-789\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge7-1024x226.png\" alt=\"\" width=\"1024\" height=\"226\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge7-1024x226.png 1024w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge7-300x66.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge7-768x169.png 768w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge7.png 1406w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>OK, it looks like that I get a base64 encoded string back. Let&#8217;s <a href=\"https:\/\/base64decode.org\" target=\"_blank\" rel=\"noopener noreferrer\">decode<\/a> that also<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-790\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge8.png\" alt=\"\" width=\"767\" height=\"207\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge8.png 767w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge8-300x81.png 300w\" sizes=\"auto, (max-width: 767px) 100vw, 767px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-791\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge9.png\" alt=\"\" width=\"760\" height=\"108\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge9.png 760w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge9-300x43.png 300w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/a><\/p>\n<p>Yeah and finaly it looks like the code I need \ud83d\ude42<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-792\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge10.png\" alt=\"\" width=\"406\" height=\"247\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge10.png 406w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge10-300x183.png 300w\" sizes=\"auto, (max-width: 406px) 100vw, 406px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-793\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge11.png\" alt=\"\" width=\"638\" height=\"295\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge11.png 638w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/ivite_challenge11-300x139.png 300w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>There are some really cool IT-Security training platforms on the net, where you can practice and train your skills. Today I&#8217;ll introduce one of this <a class=\"mh-excerpt-more\" href=\"https:\/\/cybercop-training.ch\/?p=774\" title=\"Hack The Box &#8211; Penetration Testing Labs\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":776,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,4],"tags":[],"class_list":["post-774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exam-preparation","category-hacking"],"_links":{"self":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=774"}],"version-history":[{"count":8,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/774\/revisions"}],"predecessor-version":[{"id":795,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/774\/revisions\/795"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/media\/776"}],"wp:attachment":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}