Postman

1246733

Comments

  • This one was interesting, you can definitely go down a rabbit hole super easily if you assume all public tools will hold the key. This one was one-offed quite a bit and is only easy if you're super creative.

  • edited November 2019

    rooted

    PM for nuggets

  • @rholas Just sent you a PM.

  • edited November 2019

    Stuck in M*** user, any nudge for the root? Exploit in msf is not working

  • I'm not familiar with r**** so I think I'm down the rabbit hole. The obvious exploits don't work (assuming on purpose), will I need to 'guess the username' somehow, or can I find that via enumeration?

  • Type your comment> @idomino said:
    > I'm not familiar with r**** so I think I'm down the rabbit hole. The obvious exploits don't work (assuming on purpose), will I need to 'guess the username' somehow, or can I find that via enumeration?

    No guessing is needed for this box

    Hack The Box

  • > @blackwingz44 said:
    > Stuck in M*** user, any nudge for the root? Exploit in msf is not working

    Just exploit something that before getting a user you couldn't. It Is a common vulnerability.

    Hack The Box

  • GitHub > msf
    slave is not the way

    if it is slaved and you cant write, try
    slaveof no one

  • Rooted, if you think or have a question why not work.
    Try to reset machine first.

    @[email protected]

    Arrexel

  • I'm stuck with r*-i part. Is it necessary to guest the username? It is not possible to follow the steps the way is shown in a recommended book...

  • Rooted! Thanks to all for the help! I enjoyed learning about the services on this box. Thanks for providing it, @TheCyberGeek!

    thr33per

  • edited November 2019

    Rooted,thanks for who helped me.
    PM me if you need hint
    YaSsInE

  • edited November 2019

    I got access with r.... user and found the i._....k file.
    I have used ssh2john to move it to hash and john to find the passphrase...I got a match with c.........8 but connection get closed....for sure I do something wrong, but what?

  • Type your comment> @garbo77 said:

    I got access with r.... user and found the i._....k file.
    I have used ssh2john to move it to hash and john to find the passphrase...I got a match with c.........8 but connection get closed....for sure I do something wrong, but what?

    In which directory user.txt is saved? Think and check users.

    Hack The Box

  • I try to connect it with my rce py it get connection time out I use 10.10.10.160
  • Type your comment> @Pratik said:

    Type your comment> @garbo77 said:

    I got access with r.... user and found the i._....k file.
    I have used ssh2john to move it to hash and john to find the passphrase...I got a match with c.........8 but connection get closed....for sure I do something wrong, but what?

    In which directory user.txt is saved? Think and check users.

    rooted....enumerate enumerate enumerate :)

  • I am trying to sync redis slave to master but it does not seem to work. Any nudge?

  • Type your comment> @garbo77 said:

    rooted....enumerate enumerate enumerate :)

    PM me? I don't understand why I'm getting connection closed.

  • Type your comment> @garbo77 said:

    I got access with r.... user and found the i._....k file.
    I have used ssh2john to move it to hash and john to find the passphrase...I got a match with c.........8 but connection get closed....for sure I do something wrong, but what?

    I'm exactly in the same point...

  • edited November 2019

    spoiler removed

  • If you see "connection get closed" then try the password you found elsewhere.

  • edited November 2019

    @LoRKa said:

    Rooted. The box is quite easy although you can always learn something.
    There are too many hints in the forum to solve this.
    Something that I have found curious is to see how the author has left all .bash_history with his commands.

    Enjoy friends!

    :D OOPS! That should of definatly not been left behind! I guess we all make mistakes XD

    @thr33per @n4v1n @0X44696F21 Thanks for your kind words! I'm glad you all enjoyed it!

  • I'have some errors on remote "r***" (for first shell) but not in my local instance is a normal behavior ? .

  • Rooted. The user was way harder than root.
    I got the root in 5 minutes after root ( research included )
    If you need some hints feel free to PM me.

    Special thanks to @PinkDraconian who helped me in the process :D

    zaBogdan

    If you need help with the boxes, pm me on Discord, zaBogdan#3458, I always forget to respond on form

  • need hint for root pls dm me

  • Type your comment> @ethicalkiller said:

    need hint for root pls dm me

    Use information from your initial recon, you'll know where to go next.

  • edited November 2019

    I've got rs user. I don't know how to use the i_a.bak file to proceed. Any help would be awesome.

  • Thanks @TheCyberGeek. Was indeed an easy one. Did go directly to root, with information found in shell via r*.

    User: Go through r* to get the key and use the pass.
    Root: CVE

  • edited November 2019

    can i get the user the same way i got on the box?

    EDIT: I should just read the post above...

    Hack The Box

  • Relatively easy, but made me realize that i still dont have a routine and i fall for rabbitholes. I still think it was entertaining and actually rating is spot on.

    Blaudoom

Sign In to comment.