Hey guys! I need a hint. So i have a ww-dta shell, got decrypted creds to pl and n***v but i can't drop to theirs accounts because w-d*ta shell don't take input, like su and ssh requires a key file. I should enumerate next too?
How did you decrypt the creds of n*v,
I was only able to decrypt pl's creds.
Could someone give me a hint? I found the /C**eN***/ L**** p*** and now i don't know what to do with it, I barely found it almost by accident without the dirbuster
Could someone give me a hint? I found the /C**eN***/ L**** p*** and now i don't know what to do with it, I barely found it almost by accident without the dirbuster
There is no need of dirbuster to get the shell. Just read everything on the webpage and use google.
Could someone give me a hint? I found the /C**eN***/ L**** p*** and now i don't know what to do with it, I barely found it almost by accident without the dirbuster
There is no need of dirbuster to get the shell. Just read everything on the webpage and use google.
after some googling i found an e*****t and after running it i'm in a s***l in www-data with a suspicious file named ex***** and a lot of .php files, am i on the right track?
No idea how to get user.txt, I feel like I've looked around everywhere, can someone point me to the right direction? thank you.
Its difficult to answer this because the simplest non-spoiler answer is to enumerate. Look in the files and folders. Make sure you know what you've found and dont assume because something looks like a random string of characters that it isn't useful.
But there's a lot of data to work through. Unfortunately, this is realistic - you might do a pentest and land on a box which has 30 user's documents and you have to go through terabytes of tedious stuff to see if they've left credentials out.
The main thing I can say is dont go too far from where your shell lands. Look at the files. If its encoded, decode it. If its hashed try to crack it. etc.
Understood, nonetheless thank you so much! I appreciate whatever help I can get
Hey guys! I need a hint. So i have a ww-dta shell, got decrypted creds to ************* but i can't drop to theirs accounts because w**-d*ta shell don't take input, like su and ssh requires a key file. I should enumerate next too?
Have you tried getting a better shell?
Yea, i tried to upgrade shell but nothing...I should search a file on machine that can help me?
Happy to help people but PLEASE explain your problem in as much detail as possible! If you say vague things like "It's not working", I cant help. This isn't Twitter so my DMs are always open.
Currently have very limited HTB time but will try to respond as quickly as possible.
I've got both user but now I am stuck at root. I've found the relevant article but I am not sure what to do after it, as far as I understand the exploit helps make r*** owned files, but I am not sure how I should be using it (considering the fact that I've logged as User2 but I don't have the password so I can't use sudo either).
I've got both user but now I am stuck at root. I've found the relevant article but I am not sure what to do after it, as far as I understand the exploit helps make r*** owned files, but I am not sure how I should be using it (considering the fact that I've logged as User2 but I don't have the password so I can't use sudo either).
A nudge would be much appreciated.
You don't need to use sudo, just stay at home make sure to liste all files, you will see something interesting !
I've got both user but now I am stuck at root. I've found the relevant article but I am not sure what to do after it, as far as I understand the exploit helps make r*** owned files, but I am not sure how I should be using it (considering the fact that I've logged as User2 but I don't have the password so I can't use sudo either).
A nudge would be much appreciated.
Read the exploit docs, think of how else it can be used. Get creative, there are at least 3 ways to do it.
Always happy to help, DM me if you need anything! Link to Profile
I do not understand why some people paste shadow, passwd, and root.txt file in low-priv user. Please do not spoil this great platform and the learning of other users.
I don't understand why people reference rockyou the way they have above? its standard knowledge that if cracking is required, they will generally fall in rockyou or other publicly avail password lists..
Same goes for starring out part of www-data and other very easily enumerated users on boxes
really stuck on user 2 , saw people talking about staying at home, but the only interesting file I found in home is .ICE******. I tried all the strings that looked like passwords but none worked. Anybody got a hint?
Just completed. Route through users was quite typical and straightforward, however root was really quite new for me. Without hints from forum routing would be rather difficult. Another subject to a deeper study. Really nice box!
Happy to help people but PLEASE explain your problem in as much detail as possible! If you say vague things like "It's not working", I cant help. This isn't Twitter so my DMs are always open.
Currently have very limited HTB time but will try to respond as quickly as possible.
Type your comment> @TazWake said:
> @astrozombie said:
>
> (Quote)
> I've no idea and people do report things for varied reasons. If you mentioned a CVE number or specific exploit it is likely to be reported.
Thanks for the reply. I didn’t have anything like that but wanted to ensure I’m not breaking any rules here inadvertently. I try to keep it pretty vague with any hints.
> But there's a lot of data to work through. Unfortunately, this is realistic - you might do a pentest and land on a box which has 30 user's documents and you have to go through terabytes of tedious stuff to see if they've left credentials out.
>
Not only is this a fair hint, it is an absolute must for a solid PenTest methodology. Thank you @Tazwake
In an attempt to follow the guidance with my own hint: as you progress to each user, pretend you are home shopping, look in every corner.
Rooted.
Whilst the foothold and the users were a good teaching, I think the root was a bit on the CTF side of things. After many enumeration scripts returning nothing, how on Earth should that path be visible?
I was out of hairs when I tried something dumb and it resulted in a good privesc blog post, tbh.
I'm totally stuck on getting root. I got user 2, saw something interesting on .v****** but I can't get how to exploit it! Any hint will be highly appreciated!
I'm totally stuck on getting root. I got user 2, saw something interesting on .v****** but I can't get how to exploit it! Any hint will be highly appreciated!
I dont know about that. My path was to enumerate, find something which allowed me do something as someone else, then I found a write up on how to use it to do something which wrote something to a place where I could use them to get priv access..
Happy to help people but PLEASE explain your problem in as much detail as possible! If you say vague things like "It's not working", I cant help. This isn't Twitter so my DMs are always open.
Currently have very limited HTB time but will try to respond as quickly as possible.
Comments
Type your comment> @MillyBilligan said:
How did you decrypt the creds of n*v,
I was only able to decrypt pl's creds.
Could someone give me a hint? I found the /C**eN***/ L**** p*** and now i don't know what to do with it, I barely found it almost by accident without the dirbuster
Type your comment> @Limpskinz said:
There is no need of dirbuster to get the shell. Just read everything on the webpage and use google.
Type your comment> @gs4l said:
after some googling i found an e*****t and after running it i'm in a s***l in www-data with a suspicious file named ex***** and a lot of .php files, am i on the right track?
Type your comment> @TazWake said:
Understood, nonetheless thank you so much! I appreciate whatever help I can get
Feel free to PM me, but please ask good questions: https://www.shorturl.at/fmAX6
Type your comment> @TazWake said:
Yea, i tried to upgrade shell but nothing...I should search a file on machine that can help me?
@MillyBilligan said:
It might be better to try and work out why the upgrade isn't working. I dont think there is anything else on the machine which would be useful.
Note: https://www.nohello.com/
Happy to help people but PLEASE explain your problem in as much detail as possible! If you say vague things like "It's not working", I cant help. This isn't Twitter so my DMs are always open.
Currently have very limited HTB time but will try to respond as quickly as possible.
I've got both user but now I am stuck at root. I've found the relevant article but I am not sure what to do after it, as far as I understand the exploit helps make r*** owned files, but I am not sure how I should be using it (considering the fact that I've logged as User2 but I don't have the password so I can't use sudo either).
A nudge would be much appreciated.
Type your comment> @0xR3tr0z said:
You don't need to use sudo, just stay at home make sure to liste all files, you will see something interesting !
Why 50 53R10U5
STOP RESETTING THE MACHINE.
THE RESET BUTTON IT'S NOT A "PRESS ME I'M A FUNNY BUTTON"
> STOP RESETTING THE MACHINE.
> THE RESET BUTTON IT'S NOT A "PRESS ME I'M A FUNNY BUTTON"
Check the shoutbox to cancel unnecessary resets in your VPN pool.
A Chemist doing Penetration Testing - Check the Story here: BinaryBiceps
Type your comment> @TazWake said:
Finally rooted!
Thank you for your reply man.
(AFAIC, I think that hints like "stay home" are confusing)
Type your comment> @0xR3tr0z said:
Read the exploit docs, think of how else it can be used. Get creative, there are at least 3 ways to do it.
Always happy to help, DM me if you need anything!
Link to Profile
Spoiler Removed
I do not understand why some people paste shadow, passwd, and root.txt file in low-priv user. Please do not spoil this great platform and the learning of other users.
I don't understand why people reference rockyou the way they have above? its standard knowledge that if cracking is required, they will generally fall in rockyou or other publicly avail password lists..
Same goes for starring out part of www-data and other very easily enumerated users on boxes
really stuck on user 2 , saw people talking about staying at home, but the only interesting file I found in home is .ICE******. I tried all the strings that looked like passwords but none worked. Anybody got a hint?
Just completed. Route through users was quite typical and straightforward, however root was really quite new for me. Without hints from forum routing would be rather difficult. Another subject to a deeper study. Really nice box!
Rooted this box. But i got some question to people who have found the vulnerability for the rootpart by themselves. Can someone PM me ?
@astrozombie said:
I've no idea and people do report things for varied reasons. If you mentioned a CVE number or specific exploit it is likely to be reported.
Note: https://www.nohello.com/
Happy to help people but PLEASE explain your problem in as much detail as possible! If you say vague things like "It's not working", I cant help. This isn't Twitter so my DMs are always open.
Currently have very limited HTB time but will try to respond as quickly as possible.
> @astrozombie said:
>
> (Quote)
> I've no idea and people do report things for varied reasons. If you mentioned a CVE number or specific exploit it is likely to be reported.
Thanks for the reply. I didn’t have anything like that but wanted to ensure I’m not breaking any rules here inadvertently. I try to keep it pretty vague with any hints.
Cheers
> But there's a lot of data to work through. Unfortunately, this is realistic - you might do a pentest and land on a box which has 30 user's documents and you have to go through terabytes of tedious stuff to see if they've left credentials out.
>
Not only is this a fair hint, it is an absolute must for a solid PenTest methodology. Thank you @Tazwake
In an attempt to follow the guidance with my own hint: as you progress to each user, pretend you are home shopping, look in every corner.
Great work @ChefByzen for this box.
Rooted! I really enjoyed this one, a much needed linux box after tearing my hair out on a couple windows boxes.
PM for nudges
Rooted.
Whilst the foothold and the users were a good teaching, I think the root was a bit on the CTF side of things. After many enumeration scripts returning nothing, how on Earth should that path be visible?
I was out of hairs when I tried something dumb and it resulted in a good privesc blog post, tbh.
Rooted.
Very interesting machine! Thanks @ChefByzen for your work. Also thanks for @thegingerninja, @TazWake and @gunroot for hints
I'm totally stuck on getting root. I got user 2, saw something interesting on .v****** but I can't get how to exploit it! Any hint will be highly appreciated!
Nevermind, just rooted it
PM me if you need a hint!
@mindframe said:
I dont know about that. My path was to enumerate, find something which allowed me do something as someone else, then I found a write up on how to use it to do something which wrote something to a place where I could use them to get priv access..
Note: https://www.nohello.com/
Happy to help people but PLEASE explain your problem in as much detail as possible! If you say vague things like "It's not working", I cant help. This isn't Twitter so my DMs are always open.
Currently have very limited HTB time but will try to respond as quickly as possible.
Cool box, nice flow with interesting method of obtaining root, PM me if you need a nudge.
Just got root. Thanks @ChefByzen for this great box! Definitely learned something from it.
P.S: I don't know some people are not relating the name of the machine with the process to get root. It totally makes sense to me.
Feel free to send me a DM if you need some help. Just remember to tell me what you have already done so I don't spoil anything.