Active any hints

145791017

Comments

  • Anyone elses s**c***** not working?

  • Rooted! PM for hints!

    Crunch

    If you ask for help, plz include what you tried. Else no reply.

  • There are more than enough hints in this thread to help you along. It is real world which I enjoyed. Life aint a CTF

  • w00t, got user. I had to spend the first session researching the technology, since I knew basically nothing about it. There are PLENTY of great online resources, including an interesting fellow whom dedicates himself to the relevant technology :)

    Bowlslaw

  • I got user too, but facing probs now to get root. I've tried several ways, I'm using some tools named in this thread. Can't figure it out at the moment. Maybe I'm thinking to hard? Someone that wants to help? :)

    Hack The Box

  • Just leaving a shoutout to my buddy Tim for not roasting me too hard when I struggled with root.

  • Got it rooted. Thanks to @crunch for the headup!

    Hack The Box

  • been stuck to get initial foot hold for a few days ... got username and password from x** file, tried with psexec, winexe but didnt work :( Any hint?

  • Does it take long to crack with hashcat?

    Bowlslaw

  • edited August 2018

    Scratch that...I used something else and it cracked in under 5 seconds.

    Got root! Second Windows box I've done...very cool.

    Bowlslaw

  • @sheepkiller said:
    Hello everyone, if you are having issues with the typical tools mentioned in this forum to connect to the service, it's probably a misconfiguration with your Kali smb.conf file. Here is what I did to fix it:

    nano /etc/samba/smb.conf

    // In the file, I added the following in the [global] section
    client min protocol = SMB2
    client max protocol = SMB3

    sudo service smbd restart

    Thank you for this, I wasn't getting anything until I saw this.

  • @Moliata said:
    I spent hours and my brain is washed. I was just trying my first box. Is it related to SMB? Thanks.

    yeah but ill say for first box start jerry! i think is one of the easiest box here i started with nibble but asoon as i was able to get some where it got retired

    Arrexel
    OSCP | OSCE half way!

  • @ssh3ll said:

    @sckull said:
    I have the pass GPP but not found the user.
    i need help xd

    sure you didn't find it? ^^

    I found the userName but not work :d

    sckull

  • I have the User. I am stuck with root. Please PM me with hints.

  • Enumerate those PIRNCIPAL things.

  • @nullsession0x said:
    Great box, really enjoyed it. Lots learn. I disagree with people saying all you need is Kali! There are tools out there that you will need to download to enable you to complete this. The tools I used were;
    Nullinux - https://github.com/m8r0wn/nullinux
    CME (CrackMapExec) - https://github.com/byt3bl33d3r/CrackMapExec
    ImPacket - https://github.com/CoreSecurity/impacket

    Enjoy

    Got root. Interesting machine. And a lot of things learned!
    Thank you for the hints.

  • Hi all
    Can anyone give me any pointers on getting root/admin access to this server. I have the user.txt already.
    Thanks!!

    Hack The Box

  • edited August 2018

    @moony8272 said:
    Hi all
    Can anyone give me any pointers on getting root/admin access to this server. I have the user.txt already.
    Thanks!!

    Spoiler Removed - Arrexel

    I hope this not spoil anything, good luck.

  • edited August 2018

    @mcruz said:

    @moony8272 said:
    Hi all
    Can anyone give me any pointers on getting root/admin access to this server. I have the user.txt already.
    Thanks!!

    Helpful tools
    Spoiler Removed - Arrexel

    I hope this not spoil anything, good luck.

    Thanks again!!!

    Hack The Box

  • Just rooted this box - This was a great box to learn on, and learned how to use some great tools. There's enough hints on this thread to get you going but if anybody needs a little push PM me.

    plackyhacker
    ~|OSCP|OSCE|~

  • Root:: very , very nice box !!!

  • edited August 2018

    Got root. This box was pure hell for me, since I know very little about windows. I've discovered a lot and I'm very happy!

    Nice 8-)

    Elio

  • Great machine! You really have to have the right versions of j*** or h*****t to proceed. Lost two days when my h*****t box died.

    Prj7g1d

  • finally rooted... thanks for the creater. learn lots of new things. feel free to PM for hints

    Hack The Box

  • edited August 2018

    Besides looking at the obvious share, is the path to user in that share or is it something else or dependent on a specific tool?

    Update -- Okay, I'm a dumbass, it's in there...

  • Awesome box, nothing out of this forum will u need to solve this box.

    Hack The Box

  • Thx, great box. All you need is all you have, yet.

  • edited August 2018

    Nice box, but struggle with the privesc part.

    • I've got user
    • Got some hash to crack
    • Cracking it in the latest version of h*****t will however give a Token length exception

    update: looks like a bug in h*****t, an older version does the trick

  • edited August 2018

    AWESOME BOX! Gotcha ! for those who wanna get shell just use: without quotes
    ' psexec.py domainname/[email protected] cmd ' (It needs admin credential) or who do not wanna crack the hash you've found just pass the hash . Thanks creator of the box I've just learned new knowledge and thanks @stahaa for your helpfulness.

  • I have the initial creds have read a lot about the service and the documented *****roasting attack ... but how do I connect to the box?? I have no experience with AD systems.

    I have an idea what the service is and what to do but i dont know how to connect or even interact with the service. Can someone please pm and Nudge me in the right direction?

Sign In to comment.