SecNotes

Nice box, but someone keeps resetting it and itā€™s completely unnecessary. Also, brute forcing is NOT how you get in this box, neither is blasting it with any tool other than the basic enumeration.

Edit: Rooted. Very clever way of rooting. If youā€™re stuck, the answers you seek are in front of you.

Very nice machine. Was overthinking too much for priv esc:)

wilsonnkwan, maybe just write a tutorial next time. Oh wait, you didā€¦ ;|

@DataPush3r said:
wilsonnkwan, maybe just write a tutorial next time. Oh wait, you didā€¦ ;|

Not many people are as smart as you, even with that, people still need to figure it out.

Sorry if this is spoiler to you guys

@wilsonnkwan said:

@DataPush3r said:
wilsonnkwan, maybe just write a tutorial next time. Oh wait, you didā€¦ ;|

Not many people are as smart as you, even with that, people still need to figure it out.

Sorry if this is spoiler to you guys

You could of just posted the link to the shell you uploaded, that way they wouldnā€™t even have to read your post. Just click the link and get a shell.
Your not even giving them a chance to figure it out on their own. Thats the thing

I am having terrible connection to this box :frowning:

Can some guide my with privesc ?

@Nhoty said:
Can some guide my with privesc ?

Think about new feature on Windows 10 about running natively filesā€¦ And then enumeration is the key.

Sometimes all you are looking for is right in front of you. Some googling saved me a lot of time where you happen to search for a specific folder.Rooted. PM if you need a hint.

can anybody pm for initial foothold i get only some pages and create login and login find somme xss can u give me a hint

Canā€™t lunch commands related to the privesc part ā€œ****.exeā€ i was able to do it few minutes before a reboot, but not now.

@sigma4 said:
Canā€™t lunch commands related to the privesc part ā€œ****.exeā€ i was able to do it few minutes before a reboot, but not now.

Spoiler Removed - egre55

@ashishjv1 said:

@Seepckoa said:

@mxchai said:
Would be nice if someone could PM me about the initial foothold. I have no idea what to do except testing the web app, of which I found only XSS.

Thanks!

You need to do a little enumeration at the login level, we could inject what in a login page ?

i pretty much get what i need to do but the usernames taken * all of it *

Need to wait for my turn i guess ! :anguished:

Took me 2 days just to find xxxx.exe . Did someone mess up with the file or was it intentionally kept there ?

Rooted !

done

can someone PM me on intial foothold, which previous box is this like?

and me,pls

I know what I need to do in order to get root. Well, at least, I think I do. The problem is that the .exe I needed used to be there. But now itā€™s not. Iā€™ve used this .exe earlier on but I canā€™t seem to find it anywhere now. Thereā€™s a shortcut for it on the desktop but itā€™s not in the location where that shortcut is pointing. Any ideas?

@Mapperist said:
I know what I need to do in order to get root. Well, at least, I think I do. The problem is that the .exe I needed used to be there. But now itā€™s not. Iā€™ve used this .exe earlier on but I canā€™t seem to find it anywhere now. Thereā€™s a shortcut for it on the desktop but itā€™s not in the location where that shortcut is pointing. Any ideas?

I got stuck on this for days dude. Try not to focus too hard on the .exe itself, but what it could create. As soon as I realised this I had root.txt instantly.

@ashishjv1 said:

@ashishjv1 said:

@Seepckoa said:

@mxchai said:
Would be nice if someone could PM me about the initial foothold. I have no idea what to do except testing the web app, of which I found only XSS.

Thanks!

You need to do a little enumeration at the login level, we could inject what in a login page ?

i pretty much get what i need to do but the usernames taken * all of it *

Need to wait for my turn i guess ! :anguished:

Took me 2 days just to find xxxx.exe . Did someone mess up with the file or was it intentionally kept there ?

Rooted !

You didnā€™t even need to find ā€œITā€, you could of accessed it from anywhere. :wink:

@DataPush3r said:

@ashishjv1 said:

@ashishjv1 said:

@Seepckoa said:

@mxchai said:
Would be nice if someone could PM me about the initial foothold. I have no idea what to do except testing the web app, of which I found only XSS.

Thanks!

You need to do a little enumeration at the login level, we could inject what in a login page ?

i pretty much get what i need to do but the usernames taken * all of it *

Need to wait for my turn i guess ! :anguished:

Took me 2 days just to find xxxx.exe . Did someone mess up with the file or was it intentionally kept there ?

Rooted !

You didnā€™t even need to find ā€œITā€, you could of accessed it from anywhere. :wink:

Is there a way to access it from anywhere ? If Yes, Could you PM Me ?