Haystack

11718192123

Comments

  • Finally rooted. A well rounded machine in my opinion learned a lot. Thanks @JoyDragon
    Also the hints from the forum helped me especially @D4nch3n and @Jacker31 !
    User : Nothing to add
    Root : If you are trying the debugger remember the magic only needs essence :P

  • edited October 2019

    user: done!

    If you look at the query limit, you can have indices reference.

  • I have found q***** and b*** in e************ db but i do not know to explore it further. Hope this wasn't a spoiler. Can someone private message me please?

  • Got user! First box so pretty happy

  • Can someone help me get a shell?

  • ROOT HINT: learn the ELK stack, and maybe a little black magic ... which FYI learning the stack is more difficult than you may think.

  • Free Hints:

    User: remember spanish is always the key for this and the security is low.
    Horizontal PE: Banana user has famous lfi exploit, but the trick is running locally only, YOU NEED LOCAL PORT FORWARDING .
    Root: Spanish again but not Literally :) 3 files they will process, define and execute your foreign command in a txt file you should created in a path defined in one of the files which contains your reverse shell to root.

  • Finally rooted! the black magic definitly help alot.

  • Got root. Nice box of learning ELK stack ,Kibana and logstack :)

  • Finally done! This was a pretty fun box. Hints about SSH Black Magic and ELK Stack were the most helpful and kept me from being stuck for long.
    Thanks @bu77er0verfl0w for the great hints!

  • Hi,
    I'm unable to escalate to k****a , tried renaming the js of known vulnerability, does the k****a service need to be running for that?
    Really appreciate your help
    Thanks

  • Type your comment> @alalno said:

    Hi,
    I'm unable to escalate to k****a , tried renaming the js of known vulnerability, does the k****a service need to be running for that?
    Really appreciate your help
    Thanks

    you are on 127.0.0.1 you want to access a routable IP your IP then what you need ... see my previous comment in Uppercase :)

  • @twypsy said:

    If you are using curl and you get errors ...

    -Use quotes ... curl -XGET 'http://'

    Just FYI: for curl the default is GET method you the above option -XGET is not necessary.

    Regards,
    qmi

  • Well that box had layers. Nice.
    Took me some time since either my shell bugged or someone sabotaged the box, since did not see the confs in the correct dir. And naturally I didn't look there again until the next day even tough the box was reset multiple times in between. :)

    Blaudoom
    Discord: Blaudoom#1254

  • Rooted. Going from user to root was challenging, but really satisfying. I agree with those saying this box shouldn't be categorized as "Easy." Quite a bit of research necessary. Learned a ton.

    If anyone needs a hand, feel free to DM.

  • I need help with this box. I have gone through all the steps of finding the n**** in the h****. I successfully translated but now the problem is the place I thought it was to be used was wrong, i feel like i am running in circles. Any direction would be greatly appreciated.

  • Type your comment> @Z0d said:

    Type your comment> @alalno said:

    Hi,
    I'm unable to escalate to k****a , tried renaming the js of known vulnerability, does the k****a service need to be running for that?
    Really appreciate your help
    Thanks

    you are on 127.0.0.1 you want to access a routable IP your IP then what you need ... see my previous comment in Uppercase :)

    Thanks @Z0d for the port forwarding hint. But still i'm unable to escalate to k****a...unable to listen... am i missing something here?? I've configured the correct port & IP but something seems amiss..need a nudge
    Thanks

  • i know the indices, but i have no clue to use it.
    i know the ssh username but i dont know the password.

    can anybody please help me.. its been a week for me.. to complete this.

  • Getting reverse shell was real pain..after all i got root. Learned a lot from this machine . PMs are welcome.

    [[email protected] /]# hostname ; date ; echo "haystack nulled""
    haystack
    lun oct 7 15:19:21 -03 2019
    haystack nulled
    [[email protected] /]#

  • Ok guys, I've got user.txt. I little hint?

    BadRain

  • @andresitompul said:

    i know the ssh username but i dont know the password.

    can anybody please help me.. its been a week for me.. to complete this.

    How did you figure out the username if you don't know the password? B/c it's in the same data dump but a little above. Did you get a spoiler?

    Regards,
    qmi

  • edited October 2019

    Awesome box. Initial foothold was a little too CTF style for my taste, but really enjoyed low priv -> root through the elk stack. Highly recommend checking out the grok debugger when you get to that part.

    Saw some other comments on here about port forwarding and "ssh black magic", I did not have to do any port forwarding whatsoever on this.

  • Great box, that one was alot of divertido
  • need help .. anyone there.?

  • Type your comment> @qmi said:

    @andresitompul said:

    i know the ssh username but i dont know the password.

    can anybody please help me.. its been a week for me.. to complete this.

    How did you figure out the username if you don't know the password? B/c it's in the same data dump but a little above. Did you get a spoiler?

    i did a python script to check each default username.
    and one of may tested username its valid.. thats it.
    i dont know how to dump the database.

    any clue ?

    second..

    does the ssh port forwarding also work on this machine without password ?

  • So I have read through the 3 files and i know what I need to go to get root, but what I thought would work isn't. If anyone could PM me so I could shoot some ideas that would be amazing.

  • @andresitompul said:

    How did you figure out the username if you don't know the password? B/c it's in the same data dump but a little above. Did you get a spoiler?

    i did a python script to check each default username.
    and one of may tested username its valid.. thats it.

    I see.

    i dont know how to dump the database.

    any clue ?

    You may need to use an extension to ELK which enables you to view data using SQL queries. You will see tables, columns and finally data dump by the help of the good old cURL.

    does the ssh port forwarding also work on this machine without password ?

    No. You will need to have SSH user/password.

    Regards,
    qmi

  • Why wen i run the exploit from scrity to k**a*a, some times works, sometimes dont?

  • Hello, Im ki**na, any tip to get root?

  • edited October 2019

    @rfalopes said:
    Hello, Im ki**na, any tip to get root?

    Stuck at the same place. I have the 3 files and I believe I know how Grok works, but how I can use that to get a shell as root?

    Nevermind: rooted. PM if you want for tips.

    Arrexel

Sign In to comment.