Sense

Hi ,

Can anyone give a hint on the machine Sense? I have verified few issues but unable to hit it.

«1345

Comments

  • I am also stuck with this machine. but it is rated as easy. Wondering what am I missing... :/

    Hack The Box

  • This had me stumped a little bit, web enumeration is key for the first half the assessment. After that, it's easier. However, the second step - While simple, may not work and will drive you up the wall, so issue the box a reset.

    But, enumeration is key to be fair for all aspects of this box. It will give information that you can then use to build a selection of exploits to try.

  • I had some issues myself. Look into different types of encoding you can use

    Arrexel

  • i followed proper step ..proper encoding i used ...but still my shell not connects with box...

    Agent22

  • @briyani said:
    I am also stuck with this machine. but it is rated as easy. Wondering what am I missing... :/

    use web enumeration ..... dirbuster ...;)

    Agent22

  • done it ......got root ......

    Agent22

  • edited November 2017

    Okay, I'm sorry, but I'm still not quite getting this one.

    I've been using dirbuster recursively against this with various different wordlists (both in Kali and on repositories like https://github.com/danielmiessler/SecLists). I've edited the various different options to change headers and include txt,md,rc,conf,cnf,inc,php,html,cgi,phtml,pl,py files...

    I'm really no so sure what I'm missing or if I'm just not recognizing this one. I've found a couple files that are moderately interesting, but I've not been able to go anywhere with them. Could you tell me, with the above settings, should I be able to find what I need to move on, or am I still missing something?

    Perhaps I'm just recognizing the attack vector...

    Hack The Box

  • Okay, nvm.... I think I've got something....

    Hack The Box

  • @5aru said:
    Okay, I'm sorry, but I'm still not quite getting this one.

    I've been using dirbuster recursively against this with various different wordlists (both in Kali and on repositories like https://github.com/danielmiessler/SecLists). I've edited the various different options to change headers and include txt,md,rc,conf,cnf,inc,php,html,cgi,phtml,pl,py files...

    I'm really no so sure what I'm missing or if I'm just not recognizing this one. I've found a couple files that are moderately interesting, but I've not been able to go anywhere with them. Could you tell me, with the above settings, should I be able to find what I need to move on, or am I still missing something?

    Perhaps I'm just recognizing the attack vector...

    If you've done everything you said here, you have your initial foothold in front of you. Now to make use of it.

    likwidsec

  • Hi all, I have been at this box for an entire day. I have enumerated a whole lot of different potential things. I would just like to know if I am on the right path trying to gain an initial foothold.

    I think I might have the correct vector, but I am unsure of how to use it. Is there someone that I can PM about this?

  • So I managed to get the flags in the end. Is there someone that I can PM about the intended way/method?

  • The intended way is the way that you did it. You got them both using the same method, right?

    likwidsec

  • I'm sorry, I'm still a bit lost. I feel like I'm missing a crucial piece of information. I've found these files and some information that gives me a username (Sorry, I'm trying to be vague), but I still don't have a way of getting a password. I could try guessing passwords, but the box has a lockout after so many passwords, so that is pretty useless unless I'm gonna sit here and keep resetting the box. I've been scanning and scraping for a week now hoping that I'd find something else that I'm missing. I've checked certificates, cookies, directories, etc.... Once I get this one piece, the exploit is obvious, but I'm lost on what I'm missing and I don't seem to be making any more progress

    Hack The Box

  • @5aru - the username and password are located in the same exact place. Think about what software the machine is running and then read what the file says about the users password. One thing that tripped me up - the username is capitalized when you read it, but the correct username to log in with is not. Hope that helps.

    likwidsec

  • That was it, thank you. I assumed the username was exactly as it appeared

    Hack The Box

  • @5aru said:
    That was it, thank you. I assumed the username was exactly as it appeared

    Same. This tripped me up for a hot minute. Congrats.

    likwidsec

  • totally lost SENSE in this box. Did dirbuster but couldn't find anything useful. can anyone PM me the hind.

    roguesecurity

  • Guys, hint on what to do after login? I’ve tried many exploits

    Hack The Box

  • @MrRobotty try playing with dirb or nmap and continue the journey ...

    Hack The Box

  • Can someone shoot me a PM please? I found a spot to upload .. this the right path?

  • use wfuzz with a specific extension

    peek

  • @roguesecurity said:
    totally lost SENSE in this box. Did dirbuster but couldn't find anything useful. can anyone PM me the hind.

    +1

  • if you dont find with dirbuster, then try another tool, dirbuster can be good and very bad.

    peek

  • Got user and root. Extremely sensible.

    Hack The Box

  • Let me see if I got it right: it will be a file on web server that discloses the login credentials?

    zelsonm1

  • @zelsonm1 said:
    Let me see if I got it right: it will be a file on web server that discloses the login credentials?

    It is rated as 'easy'... it took me a week to figure it out.

  • More like took a week to hit the dirbuster wordlist lottery. I get enumeration is supposed to be the name of the game with these boxes, but you don't need to make it obnoxious. Just choose common wordlist entries, the result is the same whether you bruteforce for an hour or a minute.

  • @Pratik said:
    Got user and root. Extremely sensible.

    I am inside the Panel can you guide me what to do further? I saw place where i can upload files i dont where these files are getting stored so if upload a shell i dont know its path

    D4n1aLLL

  • @D4n1aLLL try harder. Enumerate more, do some research and you will find the answer

    zelsonm1

  • so has the login credentials changed since the default ones are not working ?

Sign In to comment.