Curling

stuck on the root shell I can read the root.txt file and I know what is going on in a***-***a folder. Any nudge on how to proceed. The suspicious switch does not have much information online on how I can tweak it.
Edit: nevermind got it. fun way to get root shell

nevermind, got it. fun way to get root shell

Stuck with priv esc to root. I identified the I**** file around the users dir but not sure whats going on with it or how to leverage it. I also know its being called with **** but again not sure the timing or something, please help!

Type your comment> @khalsa68 said:

Hi guys - new to HTB just finished irked - doing curling but stuck after getting user shell. I can see a------a— folder and to interesting files in there but don’t know how to tackle them. I have tried moving, copying, cating, tried signatures etc but no use. Anudge will be helpful - clear

You and me, both. I’m stuck in the exact same position. Anyone with pointers on where to go from here? It would be greatly appreciated!!!

PM me for hints …

Rooted! Was making this way harder than it was!
One “tip”: if you finished Overthewire Bandit you should have all the knowledge necessary to understand what is going on with th key parts, for root and user flag.

And if you need, pm me for hints :slight_smile:

Just joined HTB and for a first lab it is fun one!

I managed to get to user flag pretty easily but I am now stuck on root flag and could do with a couple of hints.
I noticed the files and that there is some c*** running but cannot see where. Based on the box name I also suspect I have to use c*** tool too for this one.

Am I on a good path? I am clearly missing a piece and can do with a small nudge :slight_smile:

Got user and root. Struggling with root shell. Could someone give me a hint. I know the files and command running.

Thanks

@avjeeves said:
Just joined HTB and for a first lab it is fun one!

I managed to get to user flag pretty easily but I am now stuck on root flag and could do with a couple of hints.
I noticed the files and that there is some c*** running but cannot see where. Based on the box name I also suspect I have to use c*** tool too for this one.

Am I on a good path? I am clearly missing a piece and can do with a small nudge :slight_smile:

See what you can put in one of those files you found. Then let the c*** do its thing

OK… one member change f****** user password … no thx !

I believe that I am overthinking this process, could someone give me a push, I need any and all help…

please PM for what to put in i**** file

Same as cognitiv3. Any tips for what to put in i****? Everything I’ve tried has resulted in the same user. For the record, looking for a shell.

@cumulus thanks for the tip, I was very close but over-complicating things… Got root.txt and root shell now.

@Grim120 did you manage to get root.txt? then think how you could use the same technique on other server artefacts

Hello guys! It’s my first machine. Can you please help me. I did a RS and found u*****xt file and pass**********up file. I don’t know what to do next. Thank you

Please PM I stuck on priv esc

figured out the input file (to read flag, not get shell), PM for hint

If anyone is stuck on the pa******_****up file, go check out CyberChef by GCHQ, its a great decryption tool

Fun box. certainly learned a couple things on the way… Thanks to the creator.

can anyone PM me with syntax for a script to monitor a file? been using lsof, but its not quick enough to catch the write, so I cant figure out where the job is coming from.

EDIT:, never mind… Over thinking things… have root.txt and root shell pretty quickly and easily once I took a step back.