NIbbles

1111214161719

Comments

  • @reubadoob said:

    yep, the right one in there. keep finding :)

    I don't have Signature...

  • I know there's a username somewhere but Im to lazy to try and find

  • I'm still having problems getting the root flag. I've tried numerous commands, but I'm probably doing something wrong. It either times out or some other reason.

    Vex20k

  • Do you know the username when you see it? I think I tried everything I found in the directories

  • are cronjobs relevant for priv esc in this machine?

  • @takuma said:

    @reubadoob said:

    yep, the right one in there. keep finding :)

    Thanks @takuma Got the exploit and payload together now just getting the following error:

    [!] This exploit may require manual cleanup of 'image.php' on the target

    Tried a reset. No change. Not getting a shell.

  • @reubadoob said:

    @takuma said:

    @reubadoob said:

    yep, the right one in there. keep finding :)

    Thanks @takuma Got the exploit and payload together now just getting the following error:

    [!] This exploit may require manual cleanup of 'image.php' on the target

    Tried a reset. No change. Not getting a shell.

    If you're using metasploit, check your payload. :)

    Sh311c0d324

  • @reubadoob said:

    @takuma said:

    @reubadoob said:

    yep, the right one in there. keep finding :)

    Thanks @takuma Got the exploit and payload together now just getting the following error:

    [!] This exploit may require manual cleanup of 'image.php' on the target

    Tried a reset. No change. Not getting a shell.

    Do some research. It is indicating to you something really important that is not settled :D

    c3xp1r

  • @Vex20k said:
    I'm still having problems getting the root flag. I've tried numerous commands, but I'm probably doing something wrong. It either times out or some other reason.

    Like many have suggested, enumeration of the box is really really handy in this case. There is a magic sentence somewhere in there:D

    c3xp1r

  • hello all, i have been able to decode the password but still can login. # I am 100% sure of the password. any tips

  • Hi Guys,

    Can you give me hints to login to this machine?

  • I'm trying to get the root, I ran the bash script but I'm having the following error:
    /bin/bash monitor.sh -i nibbler
    TERM environment variable not set.
    su: must be run from a terminal
    Installation failed

    andremilke

  • @delusionmoon said:
    are cronjobs relevant for priv esc in this machine?

    well... personally I r00ted w/o them...

    Thiseas

  • Need some help with Priv Esc. Have located the file that does not need passwd for root, have gone through artcles on sudo abuse. every time I run the script I get promted for a password. Have gone through all the comments and still not able to figure out the execution method. Could someone nudge me a bit further? happy to PM if any one's around

  • Never Mind.. Just rooted it. Found the issue. As mentioned before it's all in the details. All I can say is that not all programs are in their proper location. hope it's not too spoilery

  • Struggling a little bit to find the initial credentials. Would appreciate a PM if someone has an opportunity to help confirm I am on the right track.

  • edited May 2018

    FInally the joy of logging into the admin page! Got user.txt! Now onto priv esc!

    pzylence
    OSCP

  • tried combinations of default admin credentials as well as variations of Nibbles nibbles nibble etc etc - I know everyone kicks themself with the credentials but I tried all the obvious crap

  • I swear I used those credentials :/

  • edited June 2018

    Spoiler Removed - Arrexel

  • edited June 2018
    Stuck with priv esc. I know the user files have a lot to do, but I can't find a way how to exploit that. Any nudge, help, hint via PM would be really appreciated. I'm ready to facepalm myself already!

    pzylence
    OSCP

  • Actually the hard part was the admin login, because we have to positions as an owner of this system without any security mindset.

    After get the access, try to enumerate what ever you can like a hacker.

    All the information are useful.

  • Rooted!

    pzylence
    OSCP

  • Rooted, too - and I over-thought privilege escalation. Learned a lot about upgrading dumb shells to full terminals which i did not need in the end. I think I discarded the simpler way of doing things because I took an irrelevant timeout error too seriously and was too impatient ... and then went on to search more complicated solutions.

  • I'm new to htb and trying nibbles for hours, please give me a hint . PM me

  • can someone PM plz. need a help with that privileged file!!

  • G0t r00ted!

  • Hi, I am new on the HTB.

    I have logged in to the admin panel and trying to upload the shell, but I am not getting any reverse connection. I have opened ports on my router also, but still I am not getting any reverse connection. I have tried 3-4 different payload but still nothing. Can some give me a hint.

  • edited June 2018

    @Aijaz said:
    Hi, I am new on the HTB.

    I have logged in to the admin panel and trying to upload the shell, but I am not getting any reverse connection. I have opened ports on my router also, but still I am not getting any reverse connection. I have tried 3-4 different payload but still nothing. Can some give me a hint.

    Never Mind...I have got the access....it was a silly mistake from my side...now for user.txt

    EDIT 1 :- Got the user.txt......on to root flag...I have no idea on how to process further,am stuck. Can some help me.

  • Guys, can anyone help me with the priv esc? Please drop me a message. I would really appreciate your help. I have tried a lot of stuff, no luck so far. Please reach out to me.

Sign In to comment.