Postman

Could someone help me out what to use for srv***t address i’m stuck there

Type your comment> @ELMARRO said:

I am new to Hack the Box. I have tried to use the exploit described in Kali Linux an Ethical Hacker’s Cookbook and I have been unsuccessful. I also tried to use to some of the exploits in Metasploit. I would appreciate any tips. Thank you in Advance.

I tried to use an MSF exploit too, which indeed didnt work. So i tried to debug it and see what commands it ran exactly. I then manually reproduced it. By that point you end up running manual/experimental commands on a relativemy unknown protocol… which should lead you to be curious about what else is possible within that framework. Bottom line: metasploit is just a starter but not the solution.

ROOTED nice box
To get a reverse shell look for R***S exploits There’s a well documented website for that.
User and Root are easy
if you need help PM me

Great box! I got User and Root at the same time, so would be interested to hear how others did priv esc from inital shell :slight_smile: thanks @TheCyberGeek

Just rooted. Honestly to sum up this box:
enumerate then go through steps in the many walkthrus for the service.
There are a bunch guides/exploits all over the place. All you have to do is pick the right one for this service.
From there a common place to check on the box should point you in the right direction to go. Follow it all the way through and remember if one way is blocked that you already had your foot in the door. Couple this with poor user behavior/management and the use of a recent-ish vuln makes it extremely easy to privesc to root.

PM if you any help :slight_smile:

Rooted. Thanks @alesawe for getting me over the last hump.

Rooted.
This is my first box. I got a lot of information to think about. It was an exciting task. Thank you so much @N0tAC0p. I got valuable tips and tricks.
Thanks also to all those who wrote tips on going through this topic. I read all the posts related to the Postman box. And that also helped me.

Someone change the permission can’t write anything ???

WTF and resent reached to it’s mix limit ??

kindly don’t play with the permission :confused:

Think I am on the right track, I have modified a r**** exploit, although I don’t have a username. Any help appreciated, PM is fine also.

Rooted!

Fun box, user is way harder than root in my opinion. I didn’t use anything from metasploit to get initial shell, but I also didn’t come up with a script myself.

Lots and lots of research and trialling different exploits. Everything else falls into place once you get the shell.

PM me for any questions / hints.

ROOTED!

Hi everyone, finally I’m here again after a long absence!
I’m honest: I didn’t really like this machine, but I still want to thank @TheCyberGeek because I learned something new about r**** with this box!

Here are my hints

  • Foothold: enumerate and search the web for information about services you found. There is an article that explain step by step how to exploit one of these services and get a foothold into the box

  • Exploitaiton: You have to look for something interesting that you can access, then you can use some tools to extract information from it

  • User & Root flags: Don’t know if it was intended but exploiting a common vulnerability I got both of them at the same time (with information from the previous step)

Hack The Box

PM me if you need help!

Got root.

I think the best tip that I can give to someone - don’t overcomplicate it. It’s simpler than you are thinking it is.
Thanks to @Achille for giving me tip, when I was knocking my head against a wall.

Deleted

Service is unavailable and max resets reached for the day already, argh. Would someone with root mind giving the initial foothold service a kick please?

I finally got root! A very interesting machine!

r*** was pretty straightforward, but for u***, it took me some time to get it. I didn’t knew that re*** was that dangerous!

If you need a hint, just ping me via PM.

Rooted, definitely scraping the rust off of not doing this for a while lol. If anyone needs help, feel free to msg me!

Rooted, first user and root! Thanks @zweeden for a few nudges in the right direction.

It was fun! Thanks @inetshell for a hint and @TheCyberGeek for the challenge!