Giddy

so i have the username computer name cracked hashes which game password.

when i try using those to log on /****** P*****ll i it says anothorized, can some pm me please. ?

Forgot to mention this box is able to be completed without a Windows attack box.

I had some issues getting Powershell Web Access to work but it was cause I was missing some simple things in the username field.

@crysthoffer said:
“****** has reached the maximum allowed number of sessions per user. To start a new session, the user must first sign out from another session.”. I need to wait, or I can bypass this?

its 2 active user(sessions) allowed not more (its WIndows thing), so maybe you have to wait more time on free servers

I’m stucked on priv esc, can anyone help me? Pm please

Ok after retrieving root flag…decided to go after a real root/system shell… and just verified successfully reverse shell is indeed possible :slight_smile:

A small hint for Priv Esc - basic enumeration/research and its right in front of you

Very nice machine. Easy to read the file once you know the path. Learned a lot in the initial steps to user. I went back modified the code I wrote to add myself to the machine as an administrator for poops and giggles.

I’ll leave my review here. The machine was outstanding good and hard, learned a ton from it. Now to the part were i give some kind of usefull hint, for everyone that is trying to abuse the Common Factor attack that you already located you need to abuse it in a type of a different way to achieve getting what you need(Creds). Take a look into that page,http://www.patrickkeisler.com/2012/11/how-to-use-xpdirtree-to-list-all-files.html i have to say that this one is a major spoil for undergoind the whole machine process, so everyone that is overly dramatic either take your eyes away from it, or report it as SPOIL.

anyone rooted this box I can PM? I know what I have to do but for some strange reason the exploit does not seem to work.

Really nice machine. Respect to @lkys37en

Update: NVM, got user.txt

Nice box, logging in was sporadic tho

been on privesc for 2-3 days now. i know what im able to do and what i can read, found a few interesting things but not anything i can use… im now a bit blinded by it all and struggling to move forward

is there anyone will to discuss with me over pm?

delicious box

Rooted… From my point of view this box has been the most similar to a production environment… I liked a lot… good job to the machine maker

I’ve managed to get the classic Windows hash through Resr and xp_* of \G****\s***y, but cracking it with john I get ‘NO PASSWORD’, so doesn’t seem to me the right road.

Any hints? :anguished:

@iswearimnotalu said:
I’ve managed to get the classic Windows hash through Resr and xp_* of \G****\s***y, but cracking it with john I get ‘NO PASSWORD’, so doesn’t seem to me the right road.

Any hints? :anguished:

Try with the most used wordlist. You’re on the right track

@iswearimnotalu said:
I’ve managed to get the classic Windows hash through Resr and xp_* of \G****\s***y, but cracking it with john I get ‘NO PASSWORD’, so doesn’t seem to me the right road.

Any hints? :anguished:

Use hashcat with rockyou.txt and best64.rule :wink:

@Phr33fall said:

@iswearimnotalu said:
I’ve managed to get the classic Windows hash through Resr and xp_* of \G****\s***y, but cracking it with john I get ‘NO PASSWORD’, so doesn’t seem to me the right road.

Any hints? :anguished:

Use hashcat with rockyou.txt and best64.rule :wink:

Thanks!! Now I’ve to figure out where user:pass work, since “I have to contact the gateway administrator”

EDIT: nvm, got it! Needed to reset :smiley:

Simply wow! I am loving this machine. What a way to get to user. Cheers @lkys37en

Hey, I’ve managed to access the app and web PS but I couldn’t find a genuine user, I know a genuine user from the error messages, am I going in the right direction? bruteforce this user creds?