Luke

Very frustrating box and pretty straightforward once you get the initial foothold. It is just some credentials reuse stuff…
To get the initial foothold easily, don’t be like me and sometimes, try to add some file extensions to your enumeration dictionary.
I saw that a lot of people are not confident enough with curl syntax in that thread. If so, just use something like Postman or Insomnia which are designed to handle REST api.
Be brave and try harder, you will do it :smile:

Rooted! PM if you need help

rooted.
user and root: once you get the creds from that port, yuo got root, root is way too easy.
PM for hints…

Heya,

I’m struggling with getting the a******** t*****. If anyone could offer assistance that would be great.

edit: Managed to finally get the sytax right on c*** not too long ago. Kinda silly, but whatever, box finished.

Team,

Good evening! Alright so I think I have found at least 1 credential in c*****.*, however, I am trying to use this credential to get my JWT and well, I am really getting my ■■■■ kicked by syntax. I have NO experience with cl. Please PM and I will send you the syntax Im using! Thanks in advance!

Can somebody PM me to give me a hint?

Got the DB cred and several Login pages.

Dont know what to “play” with the auth on port 3000.
Read the medium article, but I don’t know how to make this command sequence work.

Boom! ROOTED; Special thanks to @weeblix and @0xNoOne for your patience and help throughout!

For what its worth:

USER: Focus on that cl syntax and don’t get stuck trying the same USER over and over again. Once that is done, utilize the information you found during the enumeration and start teasing your logins. If you found the c***.p** you are on the right path.

ROOT: Soooooo, within 45 seconds of USER I gained ROOT so you do the math.

Nice box. A bit disappointing that Ajenti service is running by root user and you don’t have privesc flow. Reverse shell can be done but not necessary.
However I spend 1 day to figure out the curl sintaxy but time was a benefit because I also discovered the postman tool. Thumb up anyway for the JWT approache, it’s not very spread along the developers but industries such as banking are starting to use it.

Anyone have a minute to help? I am having a heck of a time getting a certain “Olympic sport” C*** command to work. Going crazy trying to get the t****. I don’t know if I am using the right credentials.

Type your comment> @l30n said:

Anyone have a minute to help? I am having a heck of a time getting a certain “Olympic sport” C*** command to work. Going crazy trying to get the t****. I don’t know if I am using the right credentials.

You can shoot me a PM, make sure to include everything you tried.

I need some help with the web-panel login, I do have all users & passwords enumerated. I also do have four login endpoints. I literally tried every combination, aswell as Lower-/-Uppercase ones. I also tried some other common usernames, with all passwords that I managed to get.

Anyone could give me a hint, on why the login wont work?
Thanks.

I had some syntax problems with curl after this was fast
who needs a push PM

Let me put this other than a spoiler.
1 list everything from the lowest to the highest port
the credentials you find with that enumeration use it to get the token in the odd port
help C ** l Using cURL to authenticate with JWT Bearer tokens | by Niel de Wet | Medium
use the token to have user information
use that user information to start section in M **********
there look everything to see what you can use for A ***********
everything is ready
thanks @tilznit

Type your comment> @drUIdmoz said:

what is the deal with this curl statement? I keep getting parsing issues when piping to jq, remove it and then I get nothing back…

this is madness. can anyone PM me because I’m losing my mind here…

I keep getting 400 bad request… i’ve done a lot of chopping on the medium curl command but whats up?!

baaaahahahahahahahah BAMO

Hello, I also encountered the same problem 400 request, it is a headache

Rooted - the json was quite fun. Really enjoyable box. While the quick root may have been a let down, it felt like something I encounter at work from time-to-time.

i have multiple set sof usernames and passwords, used dirsearch, gubuster, dirb, for the portals,I have enumerated 3 login portals, however, still could not login. Even tried to pass the token to login. NO ROOT!!, this is frustrating. Any hint please

Edit: never mind, I had everything already. Took a break, tried again and rooted. DM for hints

Soooooooo stupid. Easy and stupid. Dont forgot to enumerate 3k port (dirs on it). and learn some JWT, remember root alternative name (windows name?). dont forget about wrong ways and… hate. Should i think that i am lowskill?
got user and root in 10 minuts after 2 hrs of thinking and reading forum

Could please somebody give me any hint on curl? Thank you!!!
update: worked it out

Rooted.
Such an educative machine!

Feel free to dm for help

Finally rooted. What a disappointing and unrealistic box this was.

A useful lessons with this box: Finish your enumeration thoroughly, methodically and patiently to display all possible routes in, before moving to try and exploit - otherwise you will miss things out and give yourself a real pain when things don’t work.

There are tutorials around that explain how to interact with the middle port service properly - also another recent HTB machine with the same service running. The Ippsec video / writeups of that one would be useful.

Feel free to PM and I can direct you to links etc.