Carrier

OK thx guys, I forgot I can make my one liner more complicated and use a curl or whatever to inject it. Still, a full ssh shell would be nice. Socat has it’s limitations, not to mention nc.

@Kykli said:

@0xlc said:

@Kykli said:
Hints for the reverse shell? I am able to execute commands but no luck getting reverse shell. It shuts down the connection always instantly…

try a different rev shell :wink:

Have tried so many ways already and nothing is working :astonished:

Yes i was at the same situation, i did reset the machine couple times and tried my same RCE one line codes and boom reverse shell !! I was sure about I tried that before but didnt work. So be sure that no one is working on machine or no one has already got shell from your zone machine. You know, you can check that with the page in front of you… :wink:

working on confusing root…

For people who are struggling, it’s possible to obtain a full reverse shell with a normal one-line command, you don’t need to upload an msfvenom shell or anything like that (although that may work as well).

Someones hammering the box tonight - can’t even connect to it :\

@msolnicki said:

which keys did you find? those in authorized keys? they are public of course are not gonna work

Obviously I didn’t meant pub key from authorized_keys. I’ve found private keys but it seems they are password protected.

The private key doesn’t seem password protected to me. If it were, the prompt would ask for the key passphrase - not password.

The password prompt appears because the private key you found is not valid to be used on the server and your login attempt falls through to regular password-based authentication .

@Skunkfoot said:
For people who are struggling, it’s possible to obtain a full reverse shell with a normal one-line command, you don’t need to upload an msfvenom shell or anything like that (although that may work as well).

I struggled with this until I realized I had a typo in how I was injecting my one-line command.

@petelska said:

The private key doesn’t seem password protected to me. If it were, the prompt would ask for the key passphrase - not password.

The password prompt appears because the private key you found is not valid to be used on the server and your login attempt falls through to regular password-based authentication .

You are probably right. Although I tried adding pub cert from this location to authorized_keys, and then using priv key pair to login - in theory this should work but it didn’t. That is why I assumed they are password protected. Anyway I’m going back to the drawing board with my RCE one-liner as other people suggested.

Guys can anyone guide me on this machine…kinda new to this…

Probably not a good box if you are new to this kind of thing, especially the priv esc - which was very clever and completely kicked my ■■■. Great box @snowscan thanks for creating.

May I ask for help with technical details? I think I know what to do, just missing the IT competence. PM me :slight_smile:

I have logged in, I think that i found what should I attack, it’s c***k parameter but don’t know how to proceed. Can someone PM me. Thanks

i found port 1*1
i enumerated it
i couldn’t detect anything
help

I really am stuck at where I think I have to hk $target using “a particular method” (don’t want to spoiler here) but I can’t figure out how to actually do that. I read tons of stuff about $method, but it all seems to be just pretty vague - basically everyone is just saying "yeah if $rogue does ‘something’ then you h**d $target" but if I do exactly that, then traffic to $target is no longer working. Would be nice if anyone could hook me up with some practical examples of how to do it so that $target stays available but I get to see the “the good stuff”.

@darkkilla said:
I really am stuck at where I think I have to hk $target using “a particular method” (don’t want to spoiler here) but I can’t figure out how to actually do that. I read tons of stuff about $method, but it all seems to be just pretty vague - basically everyone is just saying "yeah if $rogue does ‘something’ then you h**d $target" but if I do exactly that, then traffic to $target is no longer working. Would be nice if anyone could hook me up with some practical examples of how to do it so that $target stays available but I get to see the “the good stuff”.

amazing post! I’m exactly on the same exact point as you. And I don’t have a full knowledge of $method commands/actions in order to see good stuff keeping traffic to $target.

anyone can help

I have no idea where to go after getting access to the admin console

@farid007 said:
i found port 1*1
i enumerated it
i couldn’t detect anything
help

Did you get some data from enumerating that particular service and did you enumerate the web server? Because that way you might find some interesting loot to get further.

@dragonitesec said:

@darkkilla said:
I really am stuck at where I think I have to hk $target using “a particular method” (don’t want to spoiler here) but I can’t figure out how to actually do that. I read tons of stuff about $method, but it all seems to be just pretty vague - basically everyone is just saying "yeah if $rogue does ‘something’ then you h**d $target" but if I do exactly that, then traffic to $target is no longer working. Would be nice if anyone could hook me up with some practical examples of how to do it so that $target stays available but I get to see the “the good stuff”.

amazing post! I’m exactly on the same exact point as you. And I don’t have a full knowledge of $method commands/actions in order to see good stuff keeping traffic to $target.

Yup on the same boat lol

@darkkilla said:

@farid007 said:
i found port 1*1
i enumerated it
i couldn’t detect anything
help

Did you get some data from enumerating that particular service and did you enumerate the web server? Because that way you might find some interesting loot to get further.

i found some directory
i found doc directory
i couldn’t found chassis serial number

@farid007 said:

@darkkilla said:

@farid007 said:
i found port 1*1
i enumerated it
i couldn’t detect anything
help

Did you get some data from enumerating that particular service and did you enumerate the web server? Because that way you might find some interesting loot to get further.

i found some directory
i found doc directory
i couldn’t found chassis serial number

Earlier on you said you found a specific port and enumerated it. You didn’t get any data out of it? Because you should’ve gotten something from that.