Totally lost regarding logging into the M…L
Found credentials quite quickly for user r…
I tried using im…t’s client to connect, now I know I have to escape \ but that doesn’t seem to work. What am I missing?
Totally lost regarding logging into the M…L
Found credentials quite quickly for user r…
I tried using im…t’s client to connect, now I know I have to escape \ but that doesn’t seem to work. What am I missing?
I have a user shell going on and am trying to execute P*******w or P*****P, but keep getting errors that the scripts are not allowed to run because they contain ampersands (&) or something. No idea how to fix this. Any hints on how to do this?
the user part has been great! But an old version of the tool made me waste weeks to do a crucial step. Fortunately fixed a week ago
root : basically 99% of the time has been wasted trying to get an user shell to enumerate properly the machine… AV will make the life hard, at least for me. Once you get a stable shell, running the right enum script you will get root.txt in 5 min.
So after a handful of hours I got user and root. Overall, great box. Pretty realistic too.
Most of the issues along the way were syntax related to various tools, and issues with I******* were… Bountiful.
Another frustrating thing that happened to me is my hashcat on my Kali vm is busted, but after giving jtr the right stuff cracking someone’s hash was pretty easy and quick
I spent way too much trying to get a root shell when the root.txt was easily available going about the same direction as getting the first file needed to really kick things off.
My advice is:
As usual, enumeration is key. If you don’t poke around you won’t find what you need
Don’t over complicate things. In all honesty, this box is really easy. If you’ve done PWK labs, this box should feel right at home with the lower tier boxes
If you don’t get output or results you expect, take a look at all the options or switches you’re using
A particular “Defense” mechanism built into the OS isn’t really going to be as big of a deal as you probably think it is
If you were able to get a root shell, hit me up. I’ve got a method that I KNOW should be working, as I’ve used it on engagements in the past
Can I get a nudge in the right direction? I am trying to get a reverse shell going but keep getting blocked by the av. I already got user flag by using the x*_***l command in SQL. I already got the m-**c account cracked. Unless theres another way to get root without a shell.
Edit:Got reverse shell on m****-**c account. Now onto root. Any pointers?
Finally got root! Finally was able to finish this box. I had been working for over 26 hours collectively. I can now stop ripping my hair out. I had never learned so much about Windows box before. Great job to the creators.
Box drove me crazy. Really cool though, not going to lie.
I always hate windows boxes but I always come away knowing learning really useful stuff. Definitely updated my notes.
USER:
Giddy. End of story. All you should need to know.
ROOT:
Message me for nudges <3
let me know where you’re at.
can someone give me a hint how to get a shell to this box? I have both creds found.
I xl is enabled under the sd user. Even m** is uploading with some messages in between but ending with no session
What do I not see?
I’m at the same point, have creds for r and m. trying to use x**l to start a prl conn, not working so far. am I thinking wrong here?