What a machine!! Congras @MrR3boot I enjoyed it in every step. One of the best machines in HTB.
User: Pay attention of all enumeration process, there are full of hints. After that, you have to think or search how files could have been processed (that is the very tricky part in my opinion). Road to user was amazing and some steps fascinating haha I enjoyed a lot!.
Root: Do common enumeration, you will see root doing some stuff, then try how to take advantage of that.
Anyways, PM for help.
Thank to @dr0ctag0n and @beorn to put my in the correct direction
@DaChef said:
Just Rooted! O well that was super hard, at least for me!
Big thanks to @7sk and @beorn for their amazing help!
Special thanks to @MrR3boot for this amazing box that teached me a lot of new things
Using some interesting vulnerability I found credentials for a user to login to some service but that stuff is restricted beyond anything. Searching for ways to escape I found nothing that worked, even looking at the config didn’t offer anything there. Again using the vuln I found out that I can forward things and get a login to some other service but I can’t seem to get that to do code execution for me even though I am a super user on that service.
Any useful directions where to poke it with a stick?
I’m staring at a page that asks for credentials and also found some strange looking info somewhere else. I feel like I’ve enumerated everything but don’t know how to piece things together. It’s also possible that I overlooked a crucial piece of information. Can someone give me a push in the right direction?
I’m staring at a page that asks for credentials and also found some strange looking info somewhere else. I feel like I’ve enumerated everything but don’t know how to piece things together. It’s also possible that I overlooked a crucial piece of information. Can someone give me a push in the right direction?
It sounds like you’ve found several vhosts and one of the security findings related to one of them. If you look at the security findings, there’s something mentioned about another vhost which is likely the next step.
I’ve been enumerating for days and have found some information about a vulnerability. I just can’t find an entry-point to start solving the puzzle. Anyone willing to give me a small nudge?
Edit: Found a lead thanks to a @deviate .
finally rooted this, thanks @deviate for the initial nudge.
Hints for user: there are probably multiple paths to getting user. the path i took was pretty run-of-the-mill in the end but required some careful research, reading source, and trial and error. i overlooked some initial information (don’t trust what you read in this forum) and spent way too many days in enumeration ■■■■.
Hints for root: lot more straightforward than user.
feel free to pm for hints.
EDIT: having gotten some PMs and read some other writeups, I may have found an unintended path. The intended path appears more tortuous.
im stuck in jail, need some help with a breakout if someone is willing to nudge.
PS, what I got is, 1. the jail (i can enumerate all files from jail, but not get their contents) and 2. access to two other service users (i can read files with one of these) 3. a family guy which seems to be a total rabbit hole.