Obscurity

Type your comment> @d4sh1981 said:

Seem to be having a problem with the initial fuzzing, don’t seem to be able to find the directory

Update, i think i have found the command that will fine the directory. But it is making no sense. Can someone message me with a nudge of that i am missing. Have ffuff running and not returning every line in the file.

I found the .py file, but I have no idea on how to exploit it, any hints or references would be appreciated, cheers!

well, i’ve got a rough idea on what to exploit for RCE, but still not sure how to do so

Someone please pm for RCE , i think i know where i should serve the payload but nothing I am sending returns anything.

Best I can do is 404 or 400

Good box, once I rooted it I then learnt about 2 other ways to root it.
So I now have a totaly of 3 ways to root the box.

You can PM via discord if you need help, Discord only, please.

Recently joined HTB, so my first root here. Nice machine, simple and straightforward.

My tips:

  • simulate your RCE payload locally
  • read the code
  • things may disappear quckly, find a way to catch them

Really like this machine and all the python scripts you had to make or edit. PM for nudges.

Type your comment> @TheWick33 said:

Type your comment> @zuk4 said:

Hi All,

I’m new in the hacking world and I have decide to try this machine, but I’m struggling to understand the py script or even run it, I’m not a python person, my mistake it seems.

So I have found the directory and the py script and I need help to understand it, is anyone able to help me?

Thank you

bro how you found the secre directory and py file can you help me please

I have used dirb with a wordlist file, that was the easiest part, at least for me.

Should i try to bruteforce the key for user ?

Type your comment> @Hagbard70 said:

Should i try to bruteforce the key for user ?

this is what I have been trying to do with no luck. I am not good with the logic/math of it to do what other people are saying here.

Any nudges?

For people asking if their method for root was intended: It should follow a similar gist to the rest of the box.

Type your comment> @Hagbard70 said:

Should i try to bruteforce the key for user ?

I don’t think it’s an intended way. you would rather focus on “areas” that key is used

found .py file by hand… i just read the webpage… but my python knowledge is lacking here… could somebody give me a nudge? i’m spending way to much time on this step of understanding the py file…

Rooted!

Simple / Fun box for me.

User: Read, write & execute on your own machine and you’ll find it
Root: Take a closer look at the command, it’s fast and simple

PM if you are confused

Rooted!
Nice box, I love when you have to reverse something.
Tip: once you find that file, everything will be straightforward.
As always, try in your own box before exploit anything there.

I am still struggling with this box, I can’t get the shell to connect. It works locally but doesn’t connect. i am lost, i need help

Still trying to find the “key”, played around with the script for too long now with no progress. Is it something we find, or something that can be inferred? Any nudge would be much appreciated.

EDIT: got user, thanks @phycomp for the nudge! Made it so much harder on myself by not actually reading the file, lol

I’ve found the script, but I’m not entirely certain what it does. I am not looking for the answer so much as a nudge as to what I should be researching next. I have some small understanding of the language, but could use a little help on how to understand constructing an input that triggers an unwanted response from the server. Have tried a few random curls to see if something interesting happens, but no dice.

Any hint about foothold

Type your comment> @ghost5egy said:

Any hint about foothold

On the main page you can find direction (file in dir), you can try to find this ‘directory’ manually or use small wordlist of very common dirs. It is important to look at the very specific error message.