{"id":240,"date":"2025-09-06T19:05:00","date_gmt":"2025-09-06T19:05:00","guid":{"rendered":"https:\/\/thecyberstaff.com\/?p=240"},"modified":"2025-12-28T18:51:50","modified_gmt":"2025-12-28T18:51:50","slug":"keeper-hackthebox-lab","status":"publish","type":"post","link":"https:\/\/thecyberstaff.com\/?p=240","title":{"rendered":"Keeper- Hackthebox lab"},"content":{"rendered":"\n<p>To begin my enumeration, I performed a port scan of both TCP and UDP ports using Nmap. This initial step allowed me to establish a clear picture of the services that were exposed and set the foundation for the rest of the assessment.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-16.png\" alt=\"\" class=\"wp-image-348\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-16.png 640w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-16-300x225.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>Checking the web service on port 80, I came across a DNS hostname. Since it wasn\u2019t resolving externally, I added it manually to my \/etc\/hosts file, ensuring that all future requests would resolve properly for further testing.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"482\" height=\"172\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-17.png\" alt=\"\" class=\"wp-image-349\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-17.png 482w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-17-300x107.png 300w\" sizes=\"auto, (max-width: 482px) 100vw, 482px\" \/><\/figure>\n\n\n\n<p>While exploring the target, I identified an RT application. A quick online search revealed its default credentials, which allowed me to gain initial access. Once inside the application, I discovered another user account and, by reviewing its properties, uncovered a stored password. Testing this credential confirmed that it provided valid SSH access to the system.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"894\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-18-1024x894.png\" alt=\"\" class=\"wp-image-350\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-18-1024x894.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-18-300x262.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-18-768x671.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-18.png 1099w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"633\" height=\"296\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-19.png\" alt=\"\" class=\"wp-image-351\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-19.png 633w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-19-300x140.png 300w\" sizes=\"auto, (max-width: 633px) 100vw, 633px\" \/><\/figure>\n\n\n\n<p>Within the ticketing application, I came across a ticket where a user had mentioned uploading a crash dump from their KeePass application. Although the file itself wasn\u2019t stored directly in the ticketing system, I located it in the user\u2019s home directory on the target machine. I then transferred the dump file to my local machine for closer examination.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"675\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-20-1024x675.png\" alt=\"\" class=\"wp-image-352\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-20-1024x675.png 1024w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-20-300x198.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-20-768x506.png 768w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-20.png 1100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>During my research, I came across a public exploit for CVE-2023-32784, which targets KeePass to recover the master key. Using this exploit, I was able to successfully dump the master key from the KeePass vault.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/CMEPW\/keepass-dump-masterkey\">https:\/\/github.com\/CMEPW\/keepass-dump-masterkey<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"525\" height=\"267\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-21.png\" alt=\"\" class=\"wp-image-353\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-21.png 525w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-21-300x153.png 300w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/figure>\n\n\n\n<p>I had to search the stings online to get the correct text.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"809\" height=\"722\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-22.png\" alt=\"\" class=\"wp-image-355\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-22.png 809w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-22-300x268.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-22-768x685.png 768w\" sizes=\"auto, (max-width: 809px) 100vw, 809px\" \/><\/figure>\n\n\n\n<p>With the recovered master key in hand, I installed a KeePass client on my Kali machine and used it to unlock the vault. Once inside, I uncovered sensitive information, including a private key and a password associated with the Keeper host.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"692\" height=\"575\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-23.png\" alt=\"\" class=\"wp-image-356\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-23.png 692w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-23-300x249.png 300w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/figure>\n\n\n\n<p>I used puttygen to generate a private key file and use it to access the server as root.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"953\" height=\"279\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-24.png\" alt=\"\" class=\"wp-image-357\" srcset=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-24.png 953w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-24-300x88.png 300w, https:\/\/thecyberstaff.com\/wp-content\/uploads\/2025\/09\/image-24-768x225.png 768w\" sizes=\"auto, (max-width: 953px) 100vw, 953px\" \/><\/figure>\n\n\n\n<p>Completing the Keeper lab demonstrated how an attacker can chain multiple findings into a full system compromise. Default credentials, sensitive data in user directories, and vulnerable applications all played a role.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To begin my enumeration, I performed a port scan of both TCP and UDP ports using Nmap. This initial step allowed me to establish a clear picture of the services that were exposed and set the foundation for the rest of the assessment. Checking the web service on port 80, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":241,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-pentesting"],"brizy_media":[],"_links":{"self":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=240"}],"version-history":[{"count":2,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/240\/revisions"}],"predecessor-version":[{"id":358,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/240\/revisions\/358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/media\/241"}],"wp:attachment":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}