@dr0ctag0n said:
Thanks @MrR3boot , this was an awesome box with plenty of new and interesting attack vectors.
I particularly liked how straight-forward it was in regards to needing a specific thing to unlock access to the next and so forth. It didn’t get too much into the weeds, although the initial step was pretty hard to get without hints…the ones on the site weren’t quite specific enough.
It’s all just a learning experience though, so I guess mission accomplished.
Great machine, it took me a week and some help here and there.
Not sure if there is still a sort of unintended for root.
I was able to do it in both ways in the end, although I recognize I still have a knowledge gap to fill.
Thank you MrR3boot!
What a machine!! Congras @MrR3boot I enjoyed it in every step. One of the best machines in HTB.
User: Pay attention of all enumeration process, there are full of hints. After that, you have to think or search how files could have been processed (that is the very tricky part in my opinion). Road to user was amazing and some steps fascinating haha I enjoyed a lot!.
Root: Do common enumeration, you will see root doing some stuff, then try how to take advantage of that.
Anyways, PM for help.
Thank to @dr0ctag0n and @beorn to put my in the correct direction
What a machine!! Congras @MrR3boot I enjoyed it in every step. One of the best machines in HTB.
User: Pay attention of all enumeration process, there are full of hints. After that, you have to think or search how files could have been processed (that is the very tricky part in my opinion). Road to user was amazing and some steps fascinating haha I enjoyed a lot!.
Root: Do common enumeration, you will see root doing some stuff, then try how to take advantage of that.
Anyways, PM for help.
Thank to @dr0ctag0n and @beorn to put my in the correct direction
@DaChef said:
Just Rooted! O well that was super hard, at least for me!
Big thanks to @7sk and @beorn for their amazing help!
Special thanks to @MrR3boot for this amazing box that teached me a lot of new things
Using some interesting vulnerability I found credentials for a user to login to some service but that stuff is restricted beyond anything. Searching for ways to escape I found nothing that worked, even looking at the config didn’t offer anything there. Again using the vuln I found out that I can forward things and get a login to some other service but I can’t seem to get that to do code execution for me even though I am a super user on that service.
Any useful directions where to poke it with a stick?