Swagshop

I actually went my own way and can confirm I have a reverse shell from just using an extension in the admin panel. Got user.txt…root coming in a few mins.

For everyone trying to use some public exploits, I managed to root this box without using any of them. There is at least one other way to get both admin access and RCE on the machine without using any script.

Type your comment> @joshkor40 said:

Type your comment> @UIDEQUALSZERO said:

is anyone getting the following error with one of their exploits today?

tunnel = tunnel.group(1)
AttributeError: ‘NoneType’ object has no attribute ‘group’

It was working fine for me yesterday and I changed the parameter accordingly, PM me

Same here bro!

Just read the exploit carefully. Try to understand what it does.
A tip: Use a proxy like burp and understand why the error occurs and what you will have to change.

Can someone PM me with help on root? I know I am missing something super easy. Haven’t slept in a day, so that isn’t helping ha. I’ve got a reverse shell up now.

why resetting the machine i can’t find the right module to use in web app?
My friend is able to find the module on other server . The machines would look differents.

For initial admin access, if the exploit is not working check that path or maybe it is not the right one!!!

I can’t upload any package. They all give Name Errors. Help?

Thanks to @mogyub for helping me with a weird shell spawn issue! Not sure if something was going on in the machine. Kept getting asked for encryption keys and other odds and ends. Fun stuff! :bleep_bloop:

503 error occurs all the time today… you just can’t do much when the site is down! WTF is going on over there ?

Hi guys, I’ve found the admin login page but can’t seem to find the credentials. I’ve found a config.php file but its just blank and then every time I go to the homepage I’m getting a 503 error. Would anyone be able to help me and push me in the right direction please? Struggling to even get user! Thanks

@tomc5241 said:
Hi guys, I’ve found the admin login page but can’t seem to find the credentials. I’ve found a config.php file but its just blank and then every time I go to the homepage I’m getting a 503 error. Would anyone be able to help me and push me in the right direction please? Struggling to even get user! Thanks

Google’s your best friend. In these scenarios I like to try “{name_of_platform} exploit” and get to scrolling. Maybe you’ll find something?

Also the 503’s are plaguing us all. Happens when you’ve got a bunch of hackers hammering this thing. Just gotta wait… probably a reset on it’s way.

Finally rooted after far too long - to address some common issues people are having:

The reason everyone is 503-ing is that the site is being set to maintenance mode when people are playing with ‘Connect’. Uncheck the checkbox and it won’t happen.

Attempting to go the route outlined in Youtube Videos / Articles won’t work because the package isn’t accepted. Google [SERVICE]-tar-to-connect and use that to repackage.

Hope this helps!

I got access to admin panel but unable to get reverse shell after that, Can anybody help me?
EDIT: Got reverse shell and user flag.
Any help for root.

EDIT: Finally Got root, Thanks to @env and @MrSquakie for your help.

If anyone needs any help you can ping me.

Thanks to @ch4p and the HTB Team for the great gift at the end of the box. I’ve been waiting for this for a long time!
The box is very easy and you can use a lot of *.php files to edit them for getting a shell.

Finally got root.

This box was incredibly easy after researching the webapp but was by far the most unstable box I’ve encountered on HTB.

hints for user:
don’t rely too much on scripts or pre-made exploits. There is one you will need to get initial foothold, but to exploit web-app you can do it manually much easier after researching/enumerating the app.

hints for root:
this command should be one of the first things you run in any privesc enumeration. The output is slightly different from the usual boxes that I’ve seen on htb and the key is to understand the difference.

FInally got user and root! Thanks to everyone that helped, unfortunately I admit that I’ve lost a lot of time in a rabbit hole trying to use an exploit that, as I undestand, worked for some time but now it doens’t.

Anyway, here my two cent:

user.txt:

  • Don’t lose to much time with the exploits. There is one useful, another that isn’t necessary and you can substitute with any shell. Google will guide you in the hacking of this application, look well and you will find how to hack it. Google Fu!!!

root.txt

  • the easiest root ever so far. It’s basic basic basic enumeration, nothing difficult

PM me if you need any help!

I’m always getting:
AttributeError: ‘NoneType’ object has no attribute ‘group’
Anybody getting the same error for 3***1.*y
I set the necessary settings in the exploit.

@mava said:
I’m always getting:
AttributeError: ‘NoneType’ object has no attribute ‘group’
Anybody getting the same error for 3***1.*y
I set the necessary settings in the exploit.

I wouldn’t go down that rabbit hole my friend. Maybe other’s got it to work but there are easier ways in.

stop resetting ffs , i got logged into admin then the whole site crashed, its hard to do anything productive when its always crashing

how do i get the full path to the application?

Type your comment> @pentesta961 said:

how do i get the full path to the application?

Emumeration is key for this