Obscurity

Question about root. I think I know how what to do regarding the file in t*p. But I cant seem to the run the py file without getting permission errors. Any help?
NVM I was being stupid

Rooted! had some real fun with user. Root was a bit disappointing (too easy).
Hints:
Foothold: don’t rush with that command and that syntax only because you have seen ippsec videos and it worked. Take time to understand the tool you want to use and what to fuzz
User: just a funny puzzle game. remember that sometimes copypasting might corrupt your bytes!
Root: nothing to say. just run the thing and you are done
Pm for nuggets!

huh… that was really fun…
and i’m so ashamed that i first stepped into the trap of bruteforcing check+out…
(maybe thinking is over-estimated)…
there is really no big logic involved or great mathematical skills needed…
just keep your bytes clean and dont ruin them by copy-paste

Wow @c1cada just seen the way you got something, how long did that take? with ry?

Any hint for root?

Type your comment> @Abdelwahed said:

Any hint for root?

look at the script and what it’s doing… saying much more is not really possible

I had an insanely hard time with this one… But got it with some hints in the end… Was fun but in no way easy for someone with little python knowledge… But thats what made it fun was not knowing…

Really new and excited to get going with htb. Very very stuck on initial foothold can’t find the directory where the py file is held. Tried many wordlists could not find it. please can anyone help me with a nudge? I feel i must be overthinking it

edit - I found it finally thanks to @phycomp very helpful! was missing one piece to my fuzzing. On to the rest!

@dontknow thanx pro I have low priv shell
I loved this box
Foothold : tricky one
search analyze exploit
User : read the code reverse it
Root : tricky 2
Read the code analyze it
watch command is your friend
Thanks box creator I loved it and learned alot

.

Rooted.

Interesting box, the difficulty is very subjective for this one in my opinion.

PM if needed :slight_smile:

rooted!!! Pm for nudge

I think this is my first medium box, was pretty fun, especially user flag.

This one forced me to get away from my usual approaches which IMO is a good thing.

Some hints:

foothold: you’re told what to find, you can find it with simple tools
user: you’re given everything upfront, read it and research/understand each line, its a puzzle worth solving
root: Few ways here… one simple way is to do something twice

this is my very first box and i feel like im going about this wrong (or im just stupid) im connected in metasploit but my lists are failing to get in…

Can anyone please give me a helping hand with user. I have the pieces of the puzzle, but the glue, or the key rather, that holds them together still seems off. It’s soooo close but just not getting the proper o**.txt after getting it I think I’m off by just a few characters. Help would be much appreciated.

Rooted !!!
Really really fun box, it required some understanding of python, which is simply :heart:

This box takes you away from usual approaches to owning which I really liked.

Some HINTS:
Foothold: The page says it all, you have got the file to grab and also the directory told by them. Honestly can be grabbed manually (no fuzzing needed).

User: Simple yet interesting cracking of script, just understand what its doing and reverse it. Everything is given on a silver plate inside the home.

Root: Read the code carefully and exploit the vulnerability of SLEEPING rabit once it stored the important file at some location. Do basic scripting to capture that, since we humans are not that fast, but scripts are :wink:

Still Stuck??? Feel free to DM :slight_smile:

Nice box, got me building some cool scripts I haven’t had to do before, even if I didn’t use them.

Foothold was really basic, you could guess the directory or use a fuzz to find it. I’ve personally used this sort of directory before when starting a project.

User: Pretty simple once you find the files. I wrote a brute force script and let it run for 30 mins on a huge wordlist and found nothing. Reversing the script was so much easier and it took less than a second of compute time to find it.

Root: again really easy. Read that script you found and figure out how you can exploit it to find what you need. Took one google search and less than 5mins to get it working.

Type your comment> @Hilbert said:

I thought that was a super fun box, I enjoyed every step

user: If you understand what it’s doing, you don’t even need to write a line of code to reverse it

That’s seriously the best hint I’ve seen. Not on this box, like ever. Spared me so much time and at the same time not even revealing anything you don’t “know” already. Thanks!

@clubby789 PM’d to make sure rooted the intended way. Feels it’s still an unintended

Thanks, nice box :slight_smile:

Spoiler Removed

NVM, it’s back, thank you to whoever did that