User was fast. Hard to hint it without spoiling.
Do what you do with all Windows boxes but read the output more carefully.
If your creds are not working, maybe try to replicate what bad users and admins are doing with passwords.
User was fast. Hard to hint it without spoiling.
Do what you do with all Windows boxes but read the output more carefully.
If your creds are not working, maybe try to replicate what bad users and admins are doing with passwords.
Now AFK and root work this afternoon.
took a while to get this hint lol. To everyone still stuck, do your usual windows enum and maybe grep for some juicy strings?
Type your comment> @mpzz said:
> Type your comment> @joshibeast said:
>
> (Quote)
> took a while to get this hint lol. To everyone still stuck, do your usual windows enum and maybe grep for some juicy strings?
I know exactly what u mean and I have the juicy thing as well..
I do not know what to do with it coz evry i****t script denies access
It looks like somebody changes "juicy stuff" intentionally. Why there always has be an i***t who think this is funny? It would be a nice feature to have some monitoring in HTB and kicking out those who abuse the rules.
It looks like somebody changes "juicy stuff" intentionally. Why there always has be an i***t who think this is funny? It would be a nice feature to have some monitoring in HTB and kicking out those who abuse the rules.
That's not someone changing it, it's part of the box. Try harder.
GCIH | GCIA
If you need help with something, PM me how far you've got already, what you've tried etc (I won't respond to profile comments, or on box release night). And remember to +respect me if I helped you ; )
It looks like somebody changes "juicy stuff" intentionally. Why there always has be an i***t who think this is funny? It would be a nice feature to have some monitoring in HTB and kicking out those who abuse the rules.
That's not someone changing it, it's part of the box. Try harder.
I know that this is part of the box, but there was a change. Sometimes I can log in and sometimes not.
Ok So i have got pass for user m**** and I am trying to use taht creds in tolls like E4***** and other S protocol tools unfortunatelly it shows me an logon failure alert. Also I have scan all ports for that server and I have found that service W***R is working on some other port so I have use this port number an creds in some au******* module in M*********. Unfortunatelly still wrong creds , any clues?
Comments
Spoiler Removed
Can anyone give me a hint about user ?
I enumerated and got lot of usernames
Type your comment> @silverstar007 said:
find more info about users
OSCP
Spoiler Removed
rooted
PM for help
User was fast. Hard to hint it without spoiling.
Do what you do with all Windows boxes but read the output more carefully.
If your creds are not working, maybe try to replicate what bad users and admins are doing with passwords.
Now AFK and root work this afternoon.
Type your comment> @joshibeast said:
took a while to get this hint lol. To everyone still stuck, do your usual windows enum and maybe grep for some juicy strings?
> Type your comment> @joshibeast said:
>
> (Quote)
> took a while to get this hint lol. To everyone still stuck, do your usual windows enum and maybe grep for some juicy strings?
I know exactly what u mean and I have the juicy thing as well..
I do not know what to do with it coz evry i****t script denies access
Type your comment> @Impulse said:
maybe you're using that juicy thing with wrong user.. btw u dont need i****t scripts too. other port is also open..
Getting this shell is a pain, to me I'm doing it correctly but not much happening, anyone give me a Sanity check please.
<img src="https://www.hackthebox.eu/badge/team/image/1805" alt="Hack The Box">
found the users and found juice but nomather which user i put with the juice
can not login with e***-w****
If you need help with something, PM me how far you've got already, what you've tried etc.
Discord: MadHack#6530
Type your comment> @madhack said:
Just looped it in bash and I'm in.
Type your comment> @m4rc1n said:
ok thx for the advice i will keep on trying!
If you need help with something, PM me how far you've got already, what you've tried etc.
Discord: MadHack#6530
So far so good, got the user. Any pointers to root?
Type your comment> @ssumkin said:
same here... User was pretty simple but I have no clue how to proceed. I have only an idea how it will goes...
whoami /all
check groups
It looks like somebody changes "juicy stuff" intentionally. Why there always has be an i***t who think this is funny? It would be a nice feature to have some monitoring in HTB and kicking out those who abuse the rules.
Type your comment> @m4rc1n said:
thanks for the advice
got it
@m4rc1n said:
That's not someone changing it, it's part of the box. Try harder.
If you need help with something, PM me how far you've got already, what you've tried etc (I won't respond to profile comments, or on box release night). And remember to +respect me if I helped you ; )
Type your comment> @clubby789 said:
I know that this is part of the box, but there was a change. Sometimes I can log in and sometimes not.
Type your comment> @rholas said:
ok - I don't get it. Can someone send me an pm to push me in the right direction pls?
Any hints for root would be appreciated. User was pretty easy but root not so much lol (I'm not great with Windows boxes)
Check groups. Research what they can do
use something evil instead...
Got Root, I test my payload locally by build it and register the
D*L
with wine.Try!ng Hard3r, N3v3r G!v3Up.
Ok So i have got pass for user m**** and I am trying to use taht creds in tolls like E4***** and other S protocol tools unfortunatelly it shows me an logon failure alert. Also I have scan all ports for that server and I have found that service W***R is working on some other port so I have use this port number an creds in some au******* module in M*********. Unfortunatelly still wrong creds
, any clues?
search second user(r***) creds
Second user which shows in what tool?
Type your comment> @rholas said:
When you realize what are you actually looking for it becomes actually quite simple.
Now its root time -:)
most blogs do not have the code, the ones that have the screenshot of the code does not mention how they set up the project.