Craft

what about using php to query db? :slight_smile:

I have rooted the box, but there is no root.txt. Is that normal? (It’s my first machine on HTB)

Kudos to the creator to spend some time in making the machine as close to the real-life misconfigurations and lapses. Gilfoyle is my idol, so it is very hard to believe he did some horrible mistakes. Hints:-

User:- Think from the perspective why Dinesh is always ragged. What kind of commitment he has towards the repo. You will find pieces to the puzzle.

Root:- I wasted a lot of time doing something I should not have. Read the repo and stick to whatever is in scope.

Happy Rooting

user: Like others, this is the difficult part. You will need to know how to reverse a shell by taking advantage
of a Python function that is available in the repo.

I realized that upgrading my shell using the pty module in Python was not working, and this was because the chroot
enivorment does not include /bin/bash, but you have to specify /bin/sh. I believe that the jail will limit you to
Busybox commands. Upgrading the shell is done in most of Ippec’s videos. Learn this technique, it will save you a
lot of guessing.

root: Check out the new repo that you have access to. There is a program that stores SSH creds that allow you to
login to remote/local machines. This part should not take long.

other: My reverse shell was very slow and kept timing out, I do not know if this is by design or if this was just my
shell? I know there is a lot left out, but I did want to provide a few tips. I spent 80% of the time trying to
hack the box without visiting the forum, but after visiting the forum, it quickly provided the missing gaps to
hack the box.

fyi: to try harder, exhaust all your resources before visiting forum, document the new commands you learn, and
stay away from msfconsole. Msfconsole is rarely the answer for boxes here.

Type your comment> @quantlink said:

I have rooted the box, but there is no root.txt. Is that normal? (It’s my first machine on HTB)

Okay, found the obvious answer myself. Finally escaped and rooted the machine really.

Good box, there are plenty of hints in the forum but some of them are vague.
PM via Discord if you need help.

EDITED:
ROOTED

I got user on craft and stuck on it.
can’t get the root.
i found v**** service but can’t figure out how to use it to gain root access.

Rooted it
DM for any help

For faster response ping me on discord

whiteheart#9724

Just rooted,
hints:

— user:

  • Follow the obvious path
  • You are!? time to read some production code
  • login in the wanted service
    — User
  • That second repo is useful in other way
  • documentation

■■■ such a satisfying box and so similar to setup’s I’ve worked on irl

In the initial foothold, I couldn’t craft a rev shell that worked so I got drunk and went ■■■■ it, creating my own version using the commands I knew worked. Never done anything like that b4, which was fun.

The user was quite easy but I had a bit of a ‘doh’ moment when I realised my script was limited to 1 result (facepalm). Then look around in places you may have been before with the details you find here. No brute needed.

Root was pretty easy too. RTFM for that thing you found on the last step.

Oh and the theme made me scream for joy when I found it

Rooted ,DM if u need help :slight_smile:

Got user and root. For root read the documentation and apply it to the obvious .sh file and construct your own command based on the two. Shout out to @nirodha42 who helped me with my obvious stupid mistake with the db to get the additional users.

Rooted. Really fun box! Got stuck on the initial shell but finally got it. Root was all about reading the manual as others have said, I had never heard of the service before but figured it out rather quick.

Pm for hints.

So after three days I was able to get shell thanks to hevr and the many others who helped. Now onward and upwards and more days and days of struggling of figuring out whats next on the menu of pain.

Is it worth trying to exploit CVE-**-4? I was thinking in getting a reverse shell with g hs.

done 1x24 hours. insane box. great job for the author
rooted already. user.txt and root.txt owned
the hardest part on this box is finding the hash for me

need help ? PM me :smiley:

I can’t believe I spent so much time working on the payload to gain the initial foothold! My reverse shell kept closing and closing again. It was because I was calling a binary the system obviously didn’t have installed. Too much overthinking…

Can anybody help me?
I got access to gogs with correct user, found some rsa keys, i believe i can get SSH access with them, but even using * ssh - **** - id user @ host i can’t connect using ssh -i id-rsa .pub user @ host

ps: i’m having problems: sign_and_send_pubkey: signing failed: agent refused operation

am i on the right path?

Type your comment> @emp1 said:

Can anybody help me?
I got access to gogs with correct user, found some rsa keys, i believe i can get SSH access with them, but even using * ssh - **** - id user @ host i can’t connect using ssh -i id-rsa .pub user @ host

ps: i’m having problems: sign_and_send_pubkey: signing failed: agent refused operation

am i on the right path?

try to not using extension for the rsa :smiley:

can user d****h do regular ssh?