Bastion

Got root using only Kali. Except maybe the mount, I think nothing would have been harder than with a windows VM. Thanks @Kucharskov for user and @bing0o for the exploit for root. One hint regarding this one : it needs to be up to date.

Stuck on this box. Located and can connect to 2 shares remotely but not sure how to progress. Hints would be appreciate in DM. Thanks.

Rooted. Learned a lot, especially getting the regular user. Root barely took any time on Linux, no Windows. You can find a python script that helps with the final step if you search for github on “appname_decrypt.py”.

Rooted, but only because this forum gave me the hint which program to check out for the PrivEsc. How would you even figure something like that out on your own? Do you just look at all the programs that are installed and then google around to see if they’re vulnerable? Or are there automated processes to find these things?

Also, @0xNoOne is an absolute saint for writing that script.

Hi Guys,I could get the user.txt
But ı couldn’t crack the S*M file with john .I just could able to do it online via hashkiller.If someone can crack via John,please send me a PM.I really wonder what is my mistake.

Thanks

Got it. If you want to help. Feel free to PM.

Rooted! Thanks to everybody some hints in the post was the only thing needed to get me out the rabbit hole ;-D

Getting user… must I download 5GB .vhd ? So sad

Type your comment> @sayanthanpera said:

Getting user… must I download 5GB .vhd ? So sad

Just mount it dude. There’s a note on the share that even mentions that.

Type your comment> @hva said:

Type your comment> @sayanthanpera said:

Getting user… must I download 5GB .vhd ? So sad

Just mount it dude. There’s a note on the share that even mentions that.

Thanks dude

I’m doing an i******l with J am I just wasting my time?

I get administrator pass. Help me, what I need to do next?

Type your comment> @lambord9 said:

I get administrator pass. Help me, what I need to do next?
Nothing matters, rooted… :slight_smile:

I have problems with this ****decrypt.py script.I t can’t install cryptodome module and Icouldn’t solve it.Is there anyone else who has the same problem?

I need help with enumeration, my first windows box after 3 linuxes, please DM

Type your comment> @lambord9 said:

I get administrator pass. Help me, what I need to do next?

Just open file “root.txt” in Desktop folder and submit the code to get the Flag.

I’m having a huge issue trying to decrypt S#M and S##TEM files. I’m trying to use m#m#k#tz but It takes S#M and S##TEM files from the VM, not the ones that I have leached from the machine.

This machine gives me serious headaches, but it’s fun. If anyone has any clue on how I can transform my own S#M and S##TEM files into .hiv files for further decrypt with m#m#k#tz please hit me up.

Type your comment> @halisha said:

I’m having a huge issue trying to decrypt S#M and S##TEM files. I’m trying to use m#m#k#tz but It takes S#M and S##TEM files from the VM, not the ones that I have leached from the machine.

This machine gives me serious headaches, but it’s fun. If anyone has any clue on how I can transform my own S#M and S##TEM files into .hiv files for further decrypt with m#m#k#tz please hit me up.

You don’t need M#m#k#tz. Easier way to do it :wink:

Root! Good Machine

Got root.txt! Thank you for the dudde who did the python script. All done in linux.