Player

finally rooted!!
really nice box.

Rooted :slight_smile:

What a machine!! Congras @MrR3boot I enjoyed it in every step. One of the best machines in HTB.

  • User: Pay attention of all enumeration process, there are full of hints. After that, you have to think or search how files could have been processed (that is the very tricky part in my opinion). Road to user was amazing and some steps fascinating haha I enjoyed a lot!.

  • Root: Do common enumeration, you will see root doing some stuff, then try how to take advantage of that.

Anyways, PM for help.

Thank to @dr0ctag0n and @beorn to put my in the correct direction :tongue:

Just Rooted! O well that was super hard, at least for me!
Big thanks to @7sk and @beorn for their amazing help!

Special thanks to @MrR3boot for this amazing box that teached me a lot of new things :wink:

@Leonishan said:
Rooted :slight_smile:

What a machine!! Congras @MrR3boot I enjoyed it in every step. One of the best machines in HTB.

  • User: Pay attention of all enumeration process, there are full of hints. After that, you have to think or search how files could have been processed (that is the very tricky part in my opinion). Road to user was amazing and some steps fascinating haha I enjoyed a lot!.

  • Root: Do common enumeration, you will see root doing some stuff, then try how to take advantage of that.

Anyways, PM for help.

Thank to @dr0ctag0n and @beorn to put my in the correct direction :tongue:

@DaChef said:
Just Rooted! O well that was super hard, at least for me!
Big thanks to @7sk and @beorn for their amazing help!

Special thanks to @MrR3boot for this amazing box that teached me a lot of new things :wink:

Thanks for the feedback @Leonishan and @DaChef

Nice box, good job @MrR3boot

Cool box, really enjoyed it!

Got a hint that might get me somewhere, thank you, I’ll try tonight!

Found a hash value on somewhere. Probably SHA-1. But I can’t crack it. Any idea?

Using some interesting vulnerability I found credentials for a user to login to some service but that stuff is restricted beyond anything. Searching for ways to escape I found nothing that worked, even looking at the config didn’t offer anything there. Again using the vuln I found out that I can forward things and get a login to some other service but I can’t seem to get that to do code execution for me even though I am a super user on that service.

Any useful directions where to poke it with a stick?

I really enjoyed this box, user was really really cool. sup3r h4x0r. root was cool too. Really like it, cheers to the creator

I’m staring at a page that asks for credentials and also found some strange looking info somewhere else. I feel like I’ve enumerated everything but don’t know how to piece things together. It’s also possible that I overlooked a crucial piece of information. Can someone give me a push in the right direction?

Type your comment> @zaicurity said:

I’m staring at a page that asks for credentials and also found some strange looking info somewhere else. I feel like I’ve enumerated everything but don’t know how to piece things together. It’s also possible that I overlooked a crucial piece of information. Can someone give me a push in the right direction?

It sounds like you’ve found several vhosts and one of the security findings related to one of them. If you look at the security findings, there’s something mentioned about another vhost which is likely the next step.

I’ve been enumerating for days and have found some information about a vulnerability. I just can’t find an entry-point to start solving the puzzle. Anyone willing to give me a small nudge?
Edit: Found a lead thanks to a @deviate .

finally rooted this, thanks @deviate for the initial nudge.

Hints for user: there are probably multiple paths to getting user. the path i took was pretty run-of-the-mill in the end but required some careful research, reading source, and trial and error. i overlooked some initial information (don’t trust what you read in this forum) and spent way too many days in enumeration ■■■■.

Hints for root: lot more straightforward than user.

feel free to pm for hints.

EDIT: having gotten some PMs and read some other writeups, I may have found an unintended path. The intended path appears more tortuous.

I learned so much on this box…thanks @MrR3boot ! That first CVE blew my freakin mind.

Man, that’s a difficult one.

I’m stuck before User, can anyone tell me if the cct.p** on the sng VHost is the right path to initial foothold?
Thanks

edit: nvm, total rabbithole

Rooted ! Thanks to creator … I really enjoyed the box … If anyone in trouble ping me

im stuck in jail, need some help with a breakout if someone is willing to nudge.

PS, what I got is, 1. the jail (i can enumerate all files from jail, but not get their contents) and 2. access to two other service users (i can read files with one of these) 3. a family guy which seems to be a total rabbit hole.

PPS. This is a seriously cool box

Is the countdown timer a rabbit hole? Having a hard time with the initial foothold.

Edit: seems so. Got something anyway, nvm

Is the upload form a rabbit hole? keep getting 404 when trying to access uploaded files.