Finally rooted. A well rounded machine in my opinion learned a lot. Thanks @JoyDragon
Also the hints from the forum helped me especially @D4nch3n and @Jacker31 !
User : Nothing to add
Root : If you are trying the debugger remember the magic only needs essence :P
I have found q***** and b*** in e************ db but i do not know to explore it further. Hope this wasn't a spoiler. Can someone private message me please?
User: remember spanish is always the key for this and the security is low.
Horizontal PE: Banana user has famous lfi exploit, but the trick is running locally only, YOU NEED LOCAL PORT FORWARDING .
Root: Spanish again but not Literally 3 files they will process, define and execute your foreign command in a txt file you should created in a path defined in one of the files which contains your reverse shell to root.
Finally done! This was a pretty fun box. Hints about SSH Black Magic and ELK Stack were the most helpful and kept me from being stuck for long.
Thanks @bu77er0verfl0w for the great hints!
Hi,
I'm unable to escalate to k****a , tried renaming the js of known vulnerability, does the k****a service need to be running for that?
Really appreciate your help
Thanks
Hi,
I'm unable to escalate to k****a , tried renaming the js of known vulnerability, does the k****a service need to be running for that?
Really appreciate your help
Thanks
you are on 127.0.0.1 you want to access a routable IP your IP then what you need ... see my previous comment in Uppercase
Well that box had layers. Nice.
Took me some time since either my shell bugged or someone sabotaged the box, since did not see the confs in the correct dir. And naturally I didn't look there again until the next day even tough the box was reset multiple times in between.
Rooted. Going from user to root was challenging, but really satisfying. I agree with those saying this box shouldn't be categorized as "Easy." Quite a bit of research necessary. Learned a ton.
I need help with this box. I have gone through all the steps of finding the n**** in the h****. I successfully translated but now the problem is the place I thought it was to be used was wrong, i feel like i am running in circles. Any direction would be greatly appreciated.
Hi,
I'm unable to escalate to k****a , tried renaming the js of known vulnerability, does the k****a service need to be running for that?
Really appreciate your help
Thanks
you are on 127.0.0.1 you want to access a routable IP your IP then what you need ... see my previous comment in Uppercase
Thanks @Z0d for the port forwarding hint. But still i'm unable to escalate to k****a...unable to listen... am i missing something here?? I've configured the correct port & IP but something seems amiss..need a nudge
Thanks
Awesome box. Initial foothold was a little too CTF style for my taste, but really enjoyed low priv -> root through the elk stack. Highly recommend checking out the grok debugger when you get to that part.
Saw some other comments on here about port forwarding and "ssh black magic", I did not have to do any port forwarding whatsoever on this.
So I have read through the 3 files and i know what I need to go to get root, but what I thought would work isn't. If anyone could PM me so I could shoot some ideas that would be amazing.
How did you figure out the username if you don't know the password? B/c it's in the same data dump but a little above. Did you get a spoiler?
i did a python script to check each default username.
and one of may tested username its valid.. thats it.
I see.
i dont know how to dump the database.
any clue ?
You may need to use an extension to ELK which enables you to view data using SQL queries. You will see tables, columns and finally data dump by the help of the good old cURL.
does the ssh port forwarding also work on this machine without password ?
Comments
Finally rooted. A well rounded machine in my opinion learned a lot. Thanks @JoyDragon
Also the hints from the forum helped me especially @D4nch3n and @Jacker31 !
User : Nothing to add
Root : If you are trying the debugger remember the magic only needs essence :P
user: done!
If you look at the query limit, you can have indices reference.
I have found q***** and b*** in e************ db but i do not know to explore it further. Hope this wasn't a spoiler. Can someone private message me please?
Got user! First box so pretty happy
Can someone help me get a shell?
ROOT HINT: learn the ELK stack, and maybe a little black magic ... which FYI learning the stack is more difficult than you may think.
Free Hints:
User: remember spanish is always the key for this and the security is low.
3 files they will process, define and execute your foreign command in a txt file you should created in a path defined in one of the files which contains your reverse shell to root.
Horizontal PE: Banana user has famous lfi exploit, but the trick is running locally only, YOU NEED LOCAL PORT FORWARDING .
Root: Spanish again but not Literally
Finally rooted! the black magic definitly help alot.
Got root. Nice box of learning ELK stack ,Kibana and logstack
Finally done! This was a pretty fun box. Hints about SSH Black Magic and ELK Stack were the most helpful and kept me from being stuck for long.
Thanks @bu77er0verfl0w for the great hints!
Hi,
I'm unable to escalate to k****a , tried renaming the js of known vulnerability, does the k****a service need to be running for that?
Really appreciate your help
Thanks
Type your comment> @alalno said:
you are on 127.0.0.1 you want to access a routable IP your IP then what you need ... see my previous comment in Uppercase
@twypsy said:
Just FYI: for curl the default is GET method you the above option -XGET is not necessary.
Regards,
qmi
Well that box had layers. Nice.
Took me some time since either my shell bugged or someone sabotaged the box, since did not see the confs in the correct dir. And naturally I didn't look there again until the next day even tough the box was reset multiple times in between.
Discord: Blaudoom#1254
Rooted. Going from user to root was challenging, but really satisfying. I agree with those saying this box shouldn't be categorized as "Easy." Quite a bit of research necessary. Learned a ton.
If anyone needs a hand, feel free to DM.
phaz0n.github.io
I need help with this box. I have gone through all the steps of finding the n**** in the h****. I successfully translated but now the problem is the place I thought it was to be used was wrong, i feel like i am running in circles. Any direction would be greatly appreciated.
Type your comment> @Z0d said:
Thanks @Z0d for the port forwarding hint. But still i'm unable to escalate to k****a...unable to listen... am i missing something here?? I've configured the correct port & IP but something seems amiss..need a nudge
Thanks
i know the indices, but i have no clue to use it.
i know the ssh username but i dont know the password.
can anybody please help me.. its been a week for me.. to complete this.
Getting reverse shell was real pain..after all i got root. Learned a lot from this machine . PMs are welcome.
[[email protected] /]# hostname ; date ; echo "haystack nulled""
haystack
lun oct 7 15:19:21 -03 2019
haystack nulled
[[email protected] /]#
Ok guys, I've got user.txt. I little hint?
@andresitompul said:
How did you figure out the username if you don't know the password? B/c it's in the same data dump but a little above. Did you get a spoiler?
Regards,
qmi
Awesome box. Initial foothold was a little too CTF style for my taste, but really enjoyed low priv -> root through the elk stack. Highly recommend checking out the grok debugger when you get to that part.
Saw some other comments on here about port forwarding and "ssh black magic", I did not have to do any port forwarding whatsoever on this.
need help .. anyone there.?
Type your comment> @qmi said:
i did a python script to check each default username.
and one of may tested username its valid.. thats it.
i dont know how to dump the database.
any clue ?
second..
does the ssh port forwarding also work on this machine without password ?
So I have read through the 3 files and i know what I need to go to get root, but what I thought would work isn't. If anyone could PM me so I could shoot some ideas that would be amazing.
@andresitompul said:
I see.
You may need to use an extension to ELK which enables you to view data using SQL queries. You will see tables, columns and finally data dump by the help of the good old cURL.
No. You will need to have SSH user/password.
Regards,
qmi
Why wen i run the exploit from scrity to k**a*a, some times works, sometimes dont?
Hello, Im ki**na, any tip to get root?
Stuck at the same place. I have the 3 files and I believe I know how Grok works, but how I can use that to get a shell as root?
Nevermind: rooted. PM if you want for tips.