Jerry

1235710

Comments

  • edited July 2018

    All good! Rooted!

  • The funny thing is I believe this box is more real world than any htb boxes currently out. You see this kind of sht all the time lmao. Refreshing

    Looking for past Hack the Box write-ups or other security stuff? Feel free to visit: https://dastinia.io <3

  • Well, I am a total noob, never joined a CTF before, got a shell but not sure what to do next. I have no idea where to start learning cyber security either. Can I have any tips on either of these please? Thanks

  • Figured it out :|

  • edited July 2018

    Jerry is not too difficult. With the right 2 tools I had both flags within 5 min.

  • The user and all related content has been deleted.
  • yaya Owned my first Box it was easy tho no going to lie :)

    Arrexel
    OSCP | OSCE half way!

  • yo,
    just rooted the box, it was very easy and very frustrating at the same time as many people keep on fcking up the box >D , but anyways, is there someone i could dm to ask some questions about some stuff related to this box ? kindly dm me or ping me here, much appreciated. thanx

    Strolling33

  • Rooted, PM if anyone needs help ( no spoilers )

  • Easy machine ! You get 2 for 1 here ...

  • My first box lol. Learned a lot from this one.

    artsky

  • A good beginners box.

    hexiburner

  • Hi,

    First box I've attempted a box on this site and managed to get the hashes. However, when I paste them in to claim the flags, I get a message to say they are incorrect.

    Was going to bounce the box to get a clean image and try again, but it's reached it's reboot limit for the day.

    Does anyone know if this is someone messing with the hashes, or am I a few meters short of the finish line? My understanding is that the hashes are on the desktop of the administrator for a Windows box. That is what I found and am using, but aren't working.

    Cheers

  • Never mind - someone else bounced the box so I jumped straight back on and got the flags again.
    Compared to what I had, they didn't match, single character in each one had been changed

  • edited July 2018

    Can someone PM me on this please, *Edit: Sorted, tyvm for help. Pm me if you need a hint.

  • OMG this was so easy, really annoyed it took me as long as it did, love HTB :smiley:

  • i cannot see flags anywhere, am i doing something wrong?

  • jerry is an easy machine , you can complete it from a simple google search

  • As a person who only rooted 5 easy machines, this one is incredibly easy. PM me if you want hints

    wilsonnkwanl

  • Got root.
    If you need help send me a PM.

  • just re-did jerry to take notes.. let me know if you need any tips, just pm me.

    Hack The Box

  • Easiest box I've solved till now. Very basic do not overthink about anything.

    3zCulprit

  • edited July 2018

    Hello..
    I already have the reverse-shell and I am inside the server, but i can not find the files with the flags. I have looked in all folders and I didn't find them. Can someone say me any hint?
    No problem... I had just found.

  • Windows files are in different places as compared to linux

    3zCulprit

  • Do not overthinking. Even try and error you can get some information.

  • edited July 2018

    rooted ! PM me for help

    TheInnocent

    "I recognize, Mr. Reese, that there's a disparity between how much I know about you and how much you know about me. I know you'll be trying to close that gap as quickly as possible. But I should tell you... I'm a really private person."

  • This system is driving me bananas. I had two different accounts within minutes but everytime i think my exploit is going through, either manually or with msf, a 403 error shows up out of nowhere! AHHH

  • @n3tl0kr said:
    This system is driving me bananas. I had two different accounts within minutes but everytime i think my exploit is going through, either manually or with msf, a 403 error shows up out of nowhere! AHHH

    nvm, got it....pm me if you need anything...im an idiot #TRYHARDER

  • Having trouble deploying my ar payload. I have access to the manager, create a meterpreter payload for the underlying technology *ava run handler listener, navigate the the page once created. and nothing
    I tried reverting, i've tried appending payload.*sp to url but again nothing. Anyone else have this issue.?Literally used the exact same technique to crack a certain OSCP box but I must be missing something

  • @xplo8 said:
    Having trouble deploying my ar payload. I have access to the manager, create a meterpreter payload for the underlying technology *ava run handler listener, navigate the the page once created. and nothing
    I tried reverting, i've tried appending payload.*sp to url but again nothing. Anyone else have this issue.?Literally used the exact same technique to crack a certain OSCP box but I must be missing something

    Just sent you a message.. if anyone else is having trouble please feel free to PM me!

    Hack The Box

Sign In to comment.