Jarvis

18911131423

Comments

  • edited July 2019

    /

  • i am stuck on rooms , dont know where to process and what to look on the rooms , every post is saying to looked in room , i have looked into it hundred times but still nothing, help me plz

  • Got root. Amazing box. Thanks a lot @bing0o for help :wink:

  • Type your comment> @MetinYigit said:

    Got root. Amazing box. Thanks a lot @bing0o for help :wink:

    @MetinYigit you're welcome my friend, congrats :smile:

    No Hack No Life ✌😒
  • Fun box. Some people here seems to be talking about creds, however I did not use any creds at a single place... weird.

    sanre

  • Rooted! Really nice box. Feel free to PM for hints.

    ThunderB

  • Rooted! .Thanks to all people helped me. PM for hints.

  • Very nice machine, I wasted a lot of time on the first part because I overestimated it. For root, use what's under your eyes,
    sometimes you are root without being root.
  • edited July 2019

    Rooted! Very nice machine, learned a lot! My favourite box yet, big thx to @manulqwerty and @Ghostpp7 !
    Thank you @ThunderB for the hint! It spinned me out from my brain loop:)
    Feel free to PM for hints.

    Hack The Box

  • Awesome box! Thx @manulqwerty & @Ghostpp7 for a solid challenge! User was an exceptionally nice experience, and found two slightly different paths towards obtaining a shell although the vulnerability is the same -- I'm guessing that there are even more ways to do this.
    I found root pretty much by thourogh f********m enumeration, but am a bit puzzeled on what configuration flaw would lead to this privelege escallation method as this would not normally occur on any linux box for all I know. If you know more on the underlying configuration; I am all ears.

    sx02089

  • Nice box, got a little stuck on Syntax at the end but Enjoyable...

  • anyone able to assist in helping me do local priv esc. stuck with www-data user

  • Type your comment> @barondune said:
    > anyone able to assist in helping me do local priv esc. stuck with www-data user

    look for something that does not belong to you but you can borrow. :-)
  • Type your comment> @Jumecittu said:

    Type your comment> @barondune said:
    > anyone able to assist in helping me do local priv esc. stuck with www-data user

    look for something that does not belong to you but you can borrow. :-)

    Thx man. I was able to figure out user. Stuck on root

  • My best advice on root: Be lazy, you don't need a shell, you just want the flag

  • Type your comment> @t3ngu said:

    My best advice on root: Be lazy, you don't need a shell, you just want the flag

    Thx man. Someone also pointed out a few things that is a cve that abuses some systems things (leaving out details) but i dont understand it.

  • edited July 2019
    All I ever get from this s*****py script with the added command is "No output" or the help menu even if I purposely put things that are mean to be forbidden. Banging my head against the wall!!!
  • This is killing me off. I reset the box as I was getting EOF errors from the py script. Now I get the banned message and the tool I used to remote shell previously will not connect.

    Reset again and I'm banned immediately. Waiting 90 seconds does nothing. This request is to port 80 too so nothing to do with the high port. I can't fathom why I wasn't getting banned before no matter how much traffic I threw at the box, but now I can't view one web page.

  • Type your comment> @thegoatreich said:

    All I ever get from this s*****py script with the added command is "No output" or the help menu even if I purposely put things that are mean to be forbidden. Banging my head against the wall!!!

    You're pinging. If you google for ways or doing creative things with that you'll find a format that works for the script.

  • edited July 2019
    Does anyone know why I used to be able to use s&lm*p on this box with no issues, and now as soon as I do I get banned? So frustrating not being able to get back to where I was.

    Nvm. Tamper scripts enabled me to get back to os_shell. Back to that head scratcher. Googling ping commands hasn't shed any light. I feel like I'm being thick here.
  • Hi, can please somebody help me with the last step of user, where you make this specific command? I figured the vulnerability already out and know how to bypass, but I get always some errors. Please send me a message

  • Rooted.

    I found one way to an initial foothold, can see there is at least another. Interested to hear from anyone who wants to compare notes.


    OSCP | PMP

  • edited July 2019

    EDIT nevermind I think I have the answer

  • edited July 2019

    I'm stuck on the initial foothold. I'm finding other people's shells during my enumeration, and could easily just use them to get a shell as www-data but I need to know how people are getting those shells uploaded.

    I know that ****.php?***= URL that may lead to an LFI: I can not provoke this URL to give me anything of use by the way of either a file or a useful error message.

    I 've also found the login for /p*******n, but I can't exploit it unless I'm finding the credentials?

    Can someone PM me a hint to help me exploit the room?

    Edit: Got credentials to p********n, thanks to @sneakypanda for the nudge and confirming I was on the right track after the fact.

  • Can someone help me on this? I have been looking at the rooms for hours but cannot find anything. Thanks.

  • My hint to root:

    If you are using an outdated version of LinEnum... try to update it from the github page and you will be able to see the path.

    Don't be a dumb like me :neutral:

    ferreirasc
    OSCP | CRTE | Pentest+ | DCPT

  • Can anyone drop me a message with a hint on root? Happy to say where I'm up to and what I've tried. Pulling my hair out a bit!

    JohnEagle
    Always happy to help, feel free to drop me a PM for spoiler-free nudges

  • Narrowed all my issues down to the fact that I spawned a shell from sq*£)$ap. It wasn't running the py script properly and erroring out.
    Used a different way in and the script ran properly and got user.
    Thanks to @f3v3r and @solsound on Discord and @hva on here.
  • I now know how to get in but got a ban in the process. Lasting since 20mins. Is this normal?

  • Type your comment> @pourquoi said:
    > Can someone help me on this? I have been looking at the rooms for hours but cannot find anything. Thanks.

    This clue got me stuck for ages, and then it turned out I got in without any rooms at all. DM me and let me know what you've tried so far etc and I'll try to nudge you along.

    andrewh

    Happy to help people but PLEASE explain your problem in as much detail as possible!

Sign In to comment.