In general have to say the machine was good, it had different things going on and the story in general was also pretty cool.
However, I still have mixed feelings about that “jump” you have to do in order to move on. I would suggest to the people who are struggling with that bit (you know when you’re there), to actually follow the story-line that is being told through the various machines. That, along with some basic enumeration (and some simple guessing, use what you have!), can point you in the right direction.
Hey guys, I found a specific header that gave me a possible hint on where to go. (As said before in the thread, a dev-like tool). There’s an exploit module on MSF but after sending the requests, the server answers with a RST package. I was trying to abuse this manually, but I’m having a nightmare installing the needed tools and whatnot, so much that I am no longer sure if it is just a rabbit hole. If this is the right way to go, may I ask a little help with the set up of the environment and everything, and if it’s not, any hints would be appreciated.
I didn’t read through this thread, so I’m not sure what was said here. The box isn’t hard in-regards to enumeration. Everything is almost always in front of you (i.e. where you land, you can obtain the clues/creds to move forward). The tickiest part for me was understanding where the .cap came in because (although I discovered/cracked it very quickly) I didn’t think to use it’s information in that manner. Everything was straight forward. Ending was super easy.
I’m open to give hints to folks that need help. Please PM me, if so.
I’m somehow not sure why I am not able to get a shell using the msf/py exploits available. Reached out to many of them, checked in wireshark as well. Everything seems fine, but somehow, something gets fucked up and I get an RST from 10.10.10.83, which is very weird.
Ok, I have a shell to this box, I cracked what could be cracked, but I don’t seem where to go from there. I know that I am on a limited environment, but I’m not sure if I should escape it, abuse it, priv escalate from there and I’m running out of ideas. Any hint?
@HeiGou said:
Got a connection to a box, got the message from the gods, got a strange IP. Any hints on how to pivot and use that? I normally dont work very much with the D service and am stuck
Collect more information on what you got from the gods, Dig is your friend.
@DarkNight7 said:
Ok, I have a shell to this box, I cracked what could be cracked, but I don’t seem where to go from there. I know that I am on a limited environment, but I’m not sure if I should escape it, abuse it, priv escalate from there and I’m running out of ideas. Any hint?
There is another information on the cap file. browse the packets and you’ll find it. After that you have to make some educated guess to use SOME parts of those 2 informations as login credentials on a service running on the box that you already know!
The Crete island would reveal its secrets to those who don’t hesitate to look at heading part of the waves that leave the island.
After you enter the Olympia you should be looking for a way to go through the Zeus’ flight experience, that was accumulated to some essence lying next to the god’s message.
The knowledge gained from such an experience would let you enter the Rodhes. Btw, you heard this song? Don’t know about you guys, but I do love it.
Opening the portal to Hades requires some ancient magic technique so… Wait, I think there’s someone at my door, I’m gonna have a look…
Now, where was I? Right, the Olympus. The Olympus would yield to those who don’t hide their love to whales. Beautiful creatures, aren’t they?
@pzylence said:
I’m somehow not sure why I am not able to get a shell using the msf/py exploits available. Reached out to many of them, checked in wireshark as well. Everything seems fine, but somehow, something gets fucked up and I get an RST from 10.10.10.83, which is very weird.
same here the Reason is because of ping latency issue. that the only thing that i can comeup with so my be am i open AWS instance in Europe and see if i can try again. only think i can think of lol.
dude nice link man thank you! you got some nice staff on your dropBOX OSCP ill be doing in 4 month… just going for AWS Cert next 1 so been busy with that.
ill PM regarding about OSCP ether ways excellent file thanks for sharing