This one is great fun but I’m stuck A nudge in how to get the manager key would be appreciated. Thought I could download the source / ‘that log’ with the data to generate the key in with another call, but so far no joy. Can see the end result, easy to get the local version to work, but need the final piece of the puzzle.
Guess I could brute a bunch of keys with the function from the source and chuck them at the thing?
This one is great fun but I’m stuck A nudge in how to get the manager key would be appreciated. Thought I could download the source / ‘that log’ with the data to generate the key in with another call, but so far no joy. Can see the end result, easy to get the local version to work, but need the final piece of the puzzle.
Guess I could brute a bunch of keys with the function from the source and chuck them at the thing?
trying hurder anyway…
Hah! NVM! Forgot about the name of the box.
RE: Well i can segfault it but that’s where my skills die…can’t do the python-dbg gdb thing. If there’s another way hook me up. Got about 14 million keys generated, but surely that’s not the way to do this
Stuck here trying to brute force web links. Is there any special kind of tool or reading required to get moving on this box? I only have the /b***** directory.
EXTREMELY disappointed. I rooted it a couple of hours ago since the whole script is online… I then moved on to trying to root it with some unintended method, so I actually felt like i deserved to root the box… the whole thing was enumeration and copy/pasting ■■■■■…
Two hackers compromised this box, and one marked it as very hard while other marked as very easy. I wander why some people mark very hard boxes as very easy? What does that mean?
Obviously it could not be really very easy. How is it possible to spend several hours for researches and say that it was very easy?)
Well to say this it took about 1 hour 19 minutes to get the password cracked than it took me about 10 seconds to spot the hole in the python code for A**h.*y I am not trying to sound like an ■■■ but the hardest part about that was the blacklist bypass and again that took a team member literally 5 minutes so the reason 1 rated it as easy is simply it is
the root jesus i’m bashing my head off a wall that i wont profess to know ■■■■ about yet
but we obv didn’t do it at once we went to bed so we didn’t go for blood and its 60 days plus i’m just stating besides the htauth mess this is by no means a 7 hour to user box like i said we did it in roughly 2
This might be weird, but is the landing page supposed to be the default Apache page? I already discovered b***** and emulated my copy of a***.** using a docker image. My setup provides me with a session token, which I have yet to experience the web-server give me one.
fun box, learned a lot, thanks @johnnyz187 for the nudge on user
looks like the box has changed since it was released, there’s no brute forcing required to get the b***** files
for user, running the b***** files locally will help identify a problem that can be combined with some intelligent guesswork. (turns out I’m not very good at guessing.) then some more work to bypass a filter (hints already in this thread).
for root - enumerate where you might not normally, then research what you find online. i found this part to be easier than getting user.