Luke

1141517192023

Comments

  • edited July 2019

    Done and dusted.
    Thanks to @ilezu post on page 14. Why did I think it was only a folder?

  • Learned a lot on this box, thx @H4d3s. Great box!

    Hack The Box

  • Just got it. Feel free to PM for hint.

  • This machine sorta F'ed me over quite a bit, it took very little time from the point where i actually found the first creds file.
    My issue ended up being that it wasn't as much about enumeration tool but what lists were used. I used quite a few including constructing a few from various stuff on the page etc.

    having done the craft box before this one made the 3000 part a lot easier then what it could be.

    root = way to easy, pitty

    but I appreciate the effort put into this box by @H4d3s

    -All hail the Potato-

  • Very straightforward box - shoot me a message if you need a nudge. :D

  • This is my first HackTheBox machine, and I am completely stuck. I have only found open ports (including 8*** and 3***) and file from ftp server, that doesn't mean anything to me.
    Any help?

  • Type your comment> @nbcrypto said:

    This is my first HackTheBox machine, and I am completely stuck. I have only found open ports (including 8*** and 3***) and file from ftp server, that doesn't mean anything to me.
    Any help?

    Try to do dirsearch and dig the secret at the odd port. You know, JWT is important

  • Could anyone shoot me a PM to help get my P*** token in c*** working? I'm at my wits end figuring it out (curl n00b)

  • Very frustrating box and pretty straightforward once you get the initial foothold. It is just some credentials reuse stuff...
    To get the initial foothold easily, don't be like me and sometimes, try to add some file extensions to your enumeration dictionary.
    I saw that a lot of people are not confident enough with curl syntax in that thread. If so, just use something like Postman or Insomnia which are designed to handle REST api.
    Be brave and try harder, you will do it :smile:

  • Rooted! PM if you need help

  • rooted.
    user and root: once you get the creds from that port, yuo got root, root is way too easy.
    PM for hints...

    OSCP
    el3ctr0

  • edited July 2019

    Heya,

    I'm struggling with getting the a******** t*****. If anyone could offer assistance that would be great.

    edit: Managed to finally get the sytax right on c*** not too long ago. Kinda silly, but whatever, box finished.

    Salsa
    OSCP | GCIH | SEC+

  • Team,

    Good evening! Alright so I think I have found at least 1 credential in c*****.***, however, I am trying to use this credential to get my JWT and well, I am really getting my butt kicked by syntax. I have NO experience with c**l. Please PM and I will send you the syntax Im using! Thanks in advance!

  • Can somebody PM me to give me a hint?

    Got the DB cred and several Login pages.

    Dont know what to "play" with the auth on port 3000.
    Read the medium article, but I don't know how to make this command sequence work.

  • Boom! ROOTED; Special thanks to @weeblix and @0xNoOne for your patience and help throughout!

    For what its worth:

    USER: Focus on that cl syntax and don't get stuck trying the same USER over and over again. Once that is done, utilize the information you found during the enumeration and start teasing your logins. If you found the c*****.p you are on the right path.

    ROOT: Soooooo, within 45 seconds of USER I gained ROOT so you do the math.

  • Nice box. A bit disappointing that Ajenti service is running by root user and you don't have privesc flow. Reverse shell can be done but not necessary.
    However I spend 1 day to figure out the curl sintaxy but time was a benefit because I also discovered the postman tool. Thumb up anyway for the JWT approache, it's not very spread along the developers but industries such as banking are starting to use it.

    clarkkent

  • Anyone have a minute to help? I am having a heck of a time getting a certain "Olympic sport" C*** command to work. Going crazy trying to get the t****. I don't know if I am using the right credentials.

    Huejash0le

  • Type your comment> @l30n said:

    Anyone have a minute to help? I am having a heck of a time getting a certain "Olympic sport" C*** command to work. Going crazy trying to get the t****. I don't know if I am using the right credentials.

    You can shoot me a PM, make sure to include everything you tried.

    I need some help with the web-panel login, I do have all users & passwords enumerated. I also do have four login endpoints. I literally tried every combination, aswell as Lower-/-Uppercase ones. I also tried some other common usernames, with all passwords that I managed to get.

    Anyone could give me a hint, on why the login wont work?
    Thanks.

    avoidy

  • I had some syntax problems with curl after this was fast
    who needs a push PM

  • Let me put this other than a spoiler.
    1 list everything from the lowest to the highest port
    the credentials you find with that enumeration use it to get the token in the odd port
    help C ** l https://medium.com/@nieldw/using-curl-to-authenticate-with-jwt-bearer-tokens-55b7fac506bd
    use the token to have user information
    use that user information to start section in M **********
    there look everything to see what you can use for A ***********
    everything is ready
    thanks @tilznit

  • Type your comment> @drUIdmoz said:

    what is the deal with this curl statement? I keep getting parsing issues when piping to jq, remove it and then I get nothing back...

    this is madness. can anyone PM me because I'm losing my mind here...

    I keep getting 400 bad request... i've done a lot of chopping on the medium curl command but whats up?!

    baaaahahahahahahahah BAMO

    Hello, I also encountered the same problem 400 request, it is a headache

  • Rooted - the json was quite fun. Really enjoyable box. While the quick root may have been a let down, it felt like something I encounter at work from time-to-time.

    Arrexel

  • edited August 2019

    i have multiple set sof usernames and passwords, used dirsearch, gubuster, dirb, for the portals,I have enumerated 3 login portals, however, still could not login. Even tried to pass the token to login. NO ROOT!!, this is frustrating. Any hint please

    Edit: never mind, I had everything already. Took a break, tried again and rooted. DM for hints

  • Soooooooo stupid. Easy and stupid. Dont forgot to enumerate 3k port (dirs on it). and learn some JWT, remember root alternative name (windows name?). dont forget about wrong ways and... hate. Should i think that i am lowskill?
    got user and root in 10 minuts after 2 hrs of thinking and reading forum

  • edited August 2019

    Could please somebody give me any hint on curl? Thank you!!!
    update: worked it out

  • Rooted.
    Such an educative machine!

    Feel free to dm for help

    trollzorftw

  • Finally rooted. What a disappointing and unrealistic box this was.

  • A useful lessons with this box: Finish your enumeration thoroughly, methodically and patiently to display all possible routes in, before moving to try and exploit - otherwise you will miss things out and give yourself a real pain when things don't work.

    There are tutorials around that explain how to interact with the middle port service properly - also another recent HTB machine with the same service running. The Ippsec video / writeups of that one would be useful.

    Feel free to PM and I can direct you to links etc.

  • Hey guys and gals,
    stuck on this one. could someone dm some assistance or point me in the right direction if possible? thanks!

  • stuck with the enumeration .
    found 3 login pages and d* user and pass
    try everything i know (maybe over thinking)
    run d**s**** and c*** no luck with the token or any more enumeration.
    PM if you got some hint or wanna help :smile:

Sign In to comment.