Conceal

G0t user , that was fun! except the config part

Struggling with Privesc on this one, could someone kindly PM to discuss?

Wow, what an adventure this box was. The first part was insane. Root was more conventional but still had many troubles getting it to work.

I got the conn successful i can browse but I cannot perform any scan after connection, did someone has a similar issue connecting from linux?

Use connect scans (nmap -sT, …). Will probably help. Another thing: you won’t see more open ports than you saw from the service where you found the credentials for the connection :wink:

Working on the first part and trying to connect. Kind of flying blind with my configuration files and command options though. Upon executing c*****-**d my packets get sent but from the output they aren’t being accepted. Eventually the application reports the “peer is not responding” and the application quits. Also I see that the application is connecting to a related yet filtered UDP port (per my Nmap scans). Is this normal behavior? Any hints via DM would be appreciated.

i have something that looks like a connection but very volatile. could someone provide me some documentation ? im a bit lost: 1 up 0 connecting

EDIT:a reset did the trick

can someone pm me? I need help with the initial setup of the VPN.

that box was awesome

Rooted!!

This box is awesome and teach me a lot of lessons…
Done in 4 days…
If anybody need help will pm me…

Finally got a webshell but not sure how to get a proper reverse shell…not receiving a connection, is it due again to ipsec?

forget it, my windows firewall was on :frowning:

I got a w** type of shell on the box i can even read the user flag, what I found odd is that i can get the files to upload to execute it, I tried different shells, that can give me a stable “regular” shell but I can get anything to execute… did someone else take this road to user? did someone found how to execute files that you upload?

for the fun, did someone compile some source code for priv esc ? which ide / compiler ? pm me (i know we can get it already compiled)

Any hint for privilege escalation part?

Got root. I like this machine.

@dplastico said:
I got a w** type of shell on the box i can even read the user flag, what I found odd is that i can get the files to upload to execute it, I tried different shells, that can give me a stable “regular” shell but I can get anything to execute… did someone else take this road to user? did someone found how to execute files that you upload?

i managed to get a meterpreter reverse https shell after a few trys it seemed windows defender was stopping them.

WOOWWWW Excelent!!! al the windows boxes are wonderful!!! This box teach me a lot!!!

Al you need to get user and root is here. The most difficult part is the Initial step

Thx!!!

Can someone please pm me, that got the V** connection going with s**** on linux, i am missing something but i can not get it what, have all the details with i**-s*** and from s******* but i can not connect :frowning:

I’m stucking on priv esc, some one pm to discution