This was a nice and easy box… if you know what to look for. But with help from the cummunity i made it. yeah root dance!
Again learned a lot since i am not good at windows boxes.
Im completely new to all windows boxes, but I did enumerate and get a bunch of users including one password, the problem is I see all the ports open on nmap but have no idea where to even login or what any of these services are. Any help would be appreciated but until then i’ll continue googling
Rooted. Fun box, learned a lot about Windows enumeration with this one, and it wasn’t overly hard. Thanks to @tekkenpc and @twypsy for the help on root. PM for hints.
I’m a little stuck and for sure it’s just that I’m tired. I got the user flag, performed the enumeration for r**t and see what the problem is, but can’t think on how to approach it.
If anyone could help by , PM me. Thanks everyone!
EDIT: got root finally. Like almost everyone said, ENUMERATION is key. Hints from @twypsy, @gurbanli and others are spot on, it might just take time to figure it out.
Finally root. when i used service daemon in my kali box, it didnt work. but when i used im****** tool it worked. still dont know why i will be glad if someone explains me why
Hints :
User : Do classic windows enumeration, then read output line by line
User2: Enumerate disk for hidden files
Root: You see user in one group, but maybe this group also has alias . check with another command. then simple google search will lead you to attack technique.
Did anyone have difficulty reading the content of the file with user 2 creds.
I am getting permission denied error, no matter what I try.
Stuck here for obscene number of hours…
Please , can anyone help ?
Another fantastic windows box. This one and Control have just been great from start to finish. Root is a great trick, which I will look out for more in the real world. You don’t need to build anything for it, in fact, you don’t even need to upload anything to the machine at all to achieve a system shell. There’s a red team blog post that’s a bit incoherent but describes the method I used to an extent.
Rooted! Nice box. Everything was pretty straight forward. Tried a lot of ways to get the D** to work based on the information available, but in the end just picked my poison for a one shot command.
I am a bit confused with the difficulty of the servers. I am not good at all with Windows, this box and another one are the only one that seemed ranked on the easy side… well, i one of the easy box deals with JSON deserialization, so “easy” that it’s not covered inmost of the entry-level courses or even the Webapp Hacker handbook, and this other one is this one, where none of the classical escalation channels (ie. misconfigured services/directory permissions) seem to apply either.