Heist

191012141524

Comments

  • Managed to get system, finally!
    For system you'll need to examine a certain process.

    k1llswitch
    "The master has failed more times then the beginner has even tried"

  • edited September 2019

    Can someone help me for root. I am so close but this machine is killing me.

    Edit: Rooted. Pr****mp.**e was right but that's all you needed. Man, I love string cheese.

  • edited September 2019

    Stuck on root, trying to manage the k**y4.*b, but I think it's a rabbit hole. Any hint?

  • Type your comment> @ivnnn1 said:

    Stuck on root, trying to manage the k**y4.*b, but I think it's a rabbit hole. Any hint?

    Ditto stuck on Root can't seem to see the process?

  • Hello UCLogical,

    What password Dcitonary are you using for those three passwords ? and i have decrypted two but other i could not.

  • @athick31
    @marlasthemage left a really solid hint for this a few pages back in this thread....

    ori0nx3

  • @ori0nx3 .... thank you got it

  • Could someone DM me with a nudge towards root? connected as the user looking at f****** processes

  • Type your comment> @ivnnn1 said:

    Stuck on root, trying to manage the k**y4.*b, but I think it's a rabbit hole. Any hint?

    Seek to see the process in action.

  • Rooted.

    Good box, learned so much. Moreover, it is an interesting way to get a box.

    Hint for users:

    • There is already what you need on this forum.

    Hints for root:

    • Once you found the process to use to get what you want. Maybe ask yourself where are stored the information you seek while this process is running :)
    • Beware of the flags you use if you use the most common tool for that.
      Maybe there is another way to go, but here are my hints.

    I hope it helps, glhf !

  • edited September 2019

    hello everyone :) working on root now. i think i understand at what process i should looking, but i can't find file k**4.d under usual location. Can somebody help me?

    nvm, I was blind, found it. Now trying to do something with it

    okay, I am stuck on it :) is where any way to copy files from heist machine to my kali and vise versa?

  • edited September 2019

    Hello, i am currently getting lots of NT_STATUS_DISCONNECTED or TIMEOUT when trying to enum S**c****t and r*******t. any help would be appreciated

    EDIT: (Got it, Thanks for the help)

  • edited September 2019

    Type your comment> @Raven37 said:

    hello everyone :) working on root now. i think i understand at what process i should looking, but i can't find file k**4.d under usual location. Can somebody help me?

    nvm, I was blind, found it. Now trying to do something with it

    okay, I am stuck on it :) is where any way to copy files from heist machine to my kali and vise versa?

    Did you able to root?, am stuck on same step got k.d* but what next? reading article , it mentioned it required log.j** to decrypt? Am i on the wrong path?

    MarsG

  • im stuck with the username, i tried all in s*b and w****r, little hint in pm, thanks

    peek

  • @MarsG no. i agree, maybe *.db is a wrong path
  • Spoiler Removed

    Hack The Box

  • i can't decrypt secret hash.. plz someone hint me

    azeroth

  • Type your comment> @azeroth said:

    i can't decrypt secret hash.. plz someone hint me

    Use hashcat - no rules - rocking list - crack in less than a minute

    Please give respect if I have helped:
    https://www.hackthebox.eu/home/users/profile/121891

  • @Raven37 said:
    hello everyone :) working on root now. i think i understand at what process i should looking, but i can't find file k**4.d under usual location. Can somebody help me?

    nvm, I was blind, found it. Now trying to do something with it

    okay, I am stuck on it :) is where any way to copy files from heist machine to my kali and vise versa?

    I used pscp:

    https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html

    1. Create a cmd session (upload nc to victim, reveres to attacking box)
    2. Upload pscp, and use it like you would scp

    Please give respect if I have helped:
    https://www.hackthebox.eu/home/users/profile/121891

  • Hi Folks,
    Stuck on privesc -
    I have the db files
    I have dumps of the process
    What am I looking for? Am I in a rabbit hole?
    Thanks

    Please give respect if I have helped:
    https://www.hackthebox.eu/home/users/profile/121891

  • Finally got root.

    Hints:
    User:
    enumerate, enumerate, enumerate
    crack what you enumerate
    enumerate some more
    Look beyond what you think is normal
    play with the rubies

    Root:
    Think a little forensically
    Grep and Strings are your friend
    Don't we always harp on credential re-use?

    Feel free to DM me for hints.

    Thanks to @minatoTW for making the box and @marlasthemage for all your help!

    Hack The Box
    Follow me on Twitter: @C_3PJoe

  • @1337mm look at my comment above.

    Hack The Box
    Follow me on Twitter: @C_3PJoe

  • Wow I had an unusual hard time getting user. Protip: use hashcat on your native machine.

  • Rooted.

    I hitted head against the wall to understand creds logic, last step was so obvious that i overlooked it.

    Pretty fun and useful box.
    - Feel free to PM for help

  • edited September 2019
    I have the k.d* file, but I'm stumped as to what to do next. I cant see a way to decrypt it with the info I have. I can't see any info that stands out from the processes either. Is there a tool or ps cmd like pspy but for windows? Also there is no l*****.j**n file?

    EDIT:

    Rooted. Was chasing rabbits.

    Hints:

    File transfers were a pain, nc.exe worked for me.

    Root - I love taking a dump on Windows!

    Awesome box, learned alot thanks @minatoTW!
  • I have all the usernames and the 3 password, still cant connect what do I miss ? Should I enum more ?

  • Type your comment> @C3PJoe said:

    @1337mm look at my comment above.

    Thanks for the comment "Think a little forensically" - rooted

    Please give respect if I have helped:
    https://www.hackthebox.eu/home/users/profile/121891

  • @MinatoTW Thanks for this exercise, taught me a lot about what can be gleaned from the process, also about seeing the trees amongst the forest.

    Please give respect if I have helped:
    https://www.hackthebox.eu/home/users/profile/121891

  • edited September 2019

    On root - Can someone DM me?

    I am unable to find the exact next step. I have a stable shell and I am able to transfer files without any issues. I have looked at every process, like others suggested in this thread, but it looks like I am unable to find the exact one that will allow me to move forward.

    Thanks!

    Edit: Rooted - Thanks @Raven37

  • Anyone knows how to decrypt cisco type 5 password??

Sign In to comment.