Remote

1232426282935

Comments

  • @LinkSmasher said:
    Stuck at root, using the TV method. Found the password !******* but am still unable to connect using TV. Feels like I'm missing something. Any nudge is appreciated.

    you can always try on different service :wink:

    image

    Be happy, always

  • edited April 2020

    I'm out of reboots with "Login failed for user a*****@*****b
    Doing all manually through chromium(mozilla session expired always) and burp
    Got shell but someone deleted user.txt, what a shame..
    Why so painful? It supposed to be easy one)

    And rooted with msf after trying almost every other possible way:D

    If someone know how to solve time problem, how to set proper cookies in py and how to root via U***** please share with me this knowledge , cause I tried all of this without success

  • Rooted, finally! Thanks @VbScrub for the nudge, I was way overthinking the rooting part.

    As a rooting hint to everyone else and hopefully without revealing too much, think about what the users generally love to do.
  • edited April 2020

    Rooted

    User: as described in previous posts, no need to mess with POC but need to tinker with payload.

    Root: I went the VT way first and got and decrypted its password as per known exploit, but after that I was lost, so I went via old good and tested tools.

    If you want to send me some nudges on how to finish the VT way, it would be good.

  • Type your comment> @Sc0rp10n said:

    Having issues cracking the hash from the s*f file. Any hints.

    Strip all the extra fluff from the string. Make sure you declare the hash type in your command.

  • Type your comment

  • Rooted !
    DM if you stuck

  • Finally got root.txt, took me way toooooooo long. ;-)
    Thanks to a hint from Rohitbarthwal I finally got it.
    Many thanks to everyone on the forum and the creator(s) of the box!

  • Rooted it the TV way, was a fun box, pm for nudges.


    Check out my blog
    Always happy to help! but please consider dropping some respect. ^^

  • root access boysss
    any nudge pm me :)

    Hack The Box

  • Well..I rooted the box last night. I used the U****c method but it was kind of anti-climatic...It wasn't the root shell method. Instead of using netmeow, I pretty much abused the service to place the root flag somewhere I can read. After I popped it into own root...it worked. It was a long battle but I learned a lot about Windows pen-testing.

    Thanks Creator!

  • edited April 2020

    Can someone dm me or inform me if there is some trick to get the u*****o exploit to work? Using one from github and if I try to issue a diff command then what is on the readme, I get an error. Trying to get user btw. I have proper creds

    EDIT: Got user

  • I got an initial shell, submitting the flag for user I get an error.

    Hack The Box

  • Can someone DM me and give me some advice on whether I'm on the right track or not?

  • got user, that's was fun :smile:
    Now onto root...

    Hack The Box

  • > @crypt0l0g1c said:
    > I got an initial shell, submitting the flag for user I get an error.

    I also encountred this, try to reset box and try again.
    Possible some users modified flag, not sure why would someone do this...

    Hack The Box

  • edited April 2020

    ok, who's the "smart guy" that changed admin password ??
    The credentials stopped working.

    EDIT: Restarted the box, now works again.

    Hack The Box

  • Rooted via svc method, anyone can PM tip me on the TV method?

    RenzoLu

  • I am facing a bit problem in TV method need help.

    s1lv3rst4r

  • rooted.
    Fun Box. Thanks mrb3n

    jiggle

    Feel free to ask for hints/nudges. Just PM me what you've already done, & give respect if I help you.

  • Found the username and password b****a***h***e to U*****o but keep getting a session time out even when I restart the box? Any ideas what I could do?
  • Hey could someone help me with root, Im having some issues with priv esc...

    Hack The Box

  • Finally, got root with u...c. I haven't much skills in hacking yet, and it was good experience for me, thanks to creator @mrb3n :)

  • Type your comment> @GuitarGuy said:

    Found the username and password b****ahe to U*****o but keep getting a session time out even when I restart the box? Any ideas what I could do?

    Are you going in the Graphical way? Try looking for any attacks against it. By it...i mean...U know.

  • finally rooted via service :smile:
    Thanks for @h0plite for hint :star:

    Will try another go at ROOT via the TV as well to learn that as well...

    Took me whole day just because box was too laggy to respond to executed commands.

    Thanks for owner for fun box !

    Hack The Box

  • Having issues running TV BO exploit, can someone help me out with it?

    Hack The Box

  • Could use a nudge for root. Focusing on TV but my enum shows no vuln or exploit for that version. Had a look relevant directories and files for hashes but cant find a path forward.
    Thanks =)

  • Type your comment> @89jase said:

    Could use a nudge for root. Focusing on TV but my enum shows no vuln or exploit for that version. Had a look relevant directories and files for hashes but cant find a path forward.
    Thanks =)

    What is the mushroom to Mario in Super Mario Bros.

  • Owned Administrator.
    Very easy machine. Direct approach to all Vulnerabilities.
    PM for little little nudges.

    A Chemist doing Penetration Testing - Check the Story here: BinaryBiceps

  • Type your comment> @0xFFensvDfndr said:

    Type your comment> @89jase said:

    Could use a nudge for root. Focusing on TV but my enum shows no vuln or exploit for that version. Had a look relevant directories and files for hashes but cant find a path forward.
    Thanks =)

    What is the mushroom to Mario in Super Mario Bros.

    Ok, but when I tried running it, it didn't work. I was In PS but the shell was inside MSF session. I don't know if that matters.

    Hack The Box

Sign In to comment.