Cascade

1246721

Comments

  • Type your comment> @ByteM3 said:

    Type your comment> @VbScrub said:

    I thought this part might trip a few people up. Don't rely on off the shelf enum scripts to just give you the answer. Do some manual enumeration of the place you found the user accounts :)

    Found the c******L*****P** but can't figure out where to use it!

    Does your password look like it belongs to the user? If not maybe, undress it :P

    Anuragd

  • edited March 29

    Got user. A little stuck on Root. Have information about resurrection, but not sure what to do with it based on what I found.

    ** EDIT: ROOTED.**

    @VbScrub Good box man. Learned quite a few new things today. Appreciated.

  • Hey all, I have creds for a user that I have reversed from how I found them but they still don't look right. Any slight nudges?

  • edited March 29

    Rooted!
    Really nice and easy box. The initial part can be a bit tricky, but after that everything is pretty straight-forward.

    Congrats to @VbScrub on creating another interesting box! Kudos to you!

    PM for hints

  • Rooted!
    That was a fun ride!
    if Anyone who used the chef, could PM to explain, that would be appreciated.

    Zigzar

  • Managed to get creds for three users but I’m still not seeing a way to get the user flag.

    bigFish43

  • Type your comment> @bigFish43 said:

    Managed to get creds for three users but I’m still not seeing a way to get the user flag.

    If you've got three sets of credentials, you should be able to login as two of them. Check all the services.

  • Type your comment> @impetuousdanny said:

    Type your comment> @bigFish43 said:

    Managed to get creds for three users but I’m still not seeing a way to get the user flag.

    If you've got three sets of credentials, you should be able to login as two of them. Check all the services.

    @impetuousdanny Thanks a bunch! Apparently I missed that one particular service in my initial port scan. Weird.

    bigFish43

  • edited March 29

    Woohoo. Rooted! Thanks @b3nn and @moszkva for the nudges. Thanks @VbScrub for a great box. Your boxes are great AD practice.
    General hint for this box: Screw your automated scripts. This needs you to think through the data you're looking at
    DM for nudges.

    Anuragd

  • @anuragd said:
    General hint for this box: Screw your automated scripts. This needs you to think through the data you're looking at

    Thanks, that's exactly what I was going for :)

  • Very nice box, VbScrub! Learned something new here. Not all data sources are equal, even tho if they appear to be! Windows is weird!

  • got user.txt but HTB keep saying it's invalid lol ?

    Arrexel
    OSCP | I'm not a rapper

  • Type your comment> @sazouki said:

    got user.txt but HTB keep saying it's invalid lol ?

    https://www.hackthebox.eu/press/integrity-of-hack-the-box

  • Type your comment> @VbScrub said:

    Type your comment> @sazouki said:

    got user.txt but HTB keep saying it's invalid lol ?

    https://www.hackthebox.eu/press/integrity-of-hack-the-box

    yeah got it & rooted thanks for this machine

    Arrexel
    OSCP | I'm not a rapper

  • @VbScrub said:

    @sazouki said:
    got user.txt but HTB keep saying it's invalid lol ?

    https://www.hackthebox.eu/press/integrity-of-hack-the-box

    This is getting ludicrous. Are we expected to reset a box, once we got user, just to get a fresh hash? :rage:
    Got user, submitted the hash within 5-10s and got invalid. The Machine was NOT reset during those few seconds, since my session is still valid (and I didn't see anything related in the shoutbox).
    Now, even after resetting the machine, the hash is the same and invalid :/


    Hack The Box
    GREM | OSCE | GASF | eJPT

  • Thx for the box! @VbScrub ! Enjoyed a lot doing it

    0x79656574

  • t> @HomeSen said:

    @VbScrub said:

    @sazouki said:
    got user.txt but HTB keep saying it's invalid lol ?

    https://www.hackthebox.eu/press/integrity-of-hack-the-box

    This is getting ludicrous. Are we expected to reset a box, once we got user, just to get a fresh hash? :rage:
    Got user, submitted the hash within 5-10s and got invalid. The Machine was NOT reset during those few seconds, since my session is still valid (and I didn't see anything related in the shoutbox).
    Now, even after resetting the machine, the hash is the same and invalid :/

    Then maybe that's not the hash?

    You mean user.txt?

    If so that's super weird and I'd suggest to contact HTB about that.

  • @l0w said:

    @HomeSen said:

    @VbScrub said:

    @sazouki said:
    got user.txt but HTB keep saying it's invalid lol ?

    https://www.hackthebox.eu/press/integrity-of-hack-the-box

    This is getting ludicrous. Are we expected to reset a box, once we got user, just to get a fresh hash? :rage:
    Got user, submitted the hash within 5-10s and got invalid. The Machine was NOT reset during those few seconds, since my session is still valid (and I didn't see anything related in the shoutbox).
    Now, even after resetting the machine, the hash is the same and invalid :/

    Then maybe that's not the hash?

    You mean user.txt?

    If so that's super weird and I'd suggest to contact HTB about that.

    After yet another reset, a new hash was generated and it actually worked.

    Also, finally rooted the machine.
    Thank you @VbScrub for that machine. Really enjoyed it. Especially the part having to use "standard service tools" to get the information that one seeks :)


    Hack The Box
    GREM | OSCE | GASF | eJPT

  • Really fun box, I enjoyed it and I learned new stuffs about LDAP
    Thank you @VbScrub

  • I have read the massive output of e***4****x several times, line by line, but no password found. Am I looking on the right place?

  • @roelvb said:
    I have read the massive output of e***4****x several times, line by line, but no password found. Am I looking on the right place?

    The information you seek is not there.
    I'd suggest switching to more traditional enumeration tools ;)


    Hack The Box
    GREM | OSCE | GASF | eJPT

  • Type your comment> @roelvb said:

    I have read the massive output of e***4****x several times, line by line, but no password found. Am I looking on the right place?

    try harder

    alt text

  • Type your comment> @sm4sh0ps said:

    Type your comment> @roelvb said:

    I have read the massive output of e***4****x several times, line by line, but no password found. Am I looking on the right place?

    try harder

    Thanks, great advise 🙄

  • Learned five things from this box, great box! Thanks to @VbScrub !

    USER

    Thorough enumeration is the key and last but not least some googling if spider sense starts tingling.

    ROOT

    Try to peek inside. Learn who you are. Try to relate with something you gathered if Monster Reborn magic card unavailable (if can't relate do some readings).

    • Scripts not gonna work, this box gonna hone your enumeration skill. Good practice.
  • Fun box overall. The storage method of the very first and very last password were a bit unrealistic to me but sometimes that's needed for the learning experience.
  • User was challenging @VbScrub, def taught me a valuable lesson at saving everything for second, and third look overs.

    Now, off to find root.

    Find KryptSec @ https://discord.gg/h22KRvU

    Treelovah

  • I got root.

    PM if you need help.

  • @VbScrub Dude, I liked your last box, but I LOVED this box. It was kind of a love-hate relationship, but by the end it was actually fun and I learned a TON! I look forward to the other boxes you have queued up.

    Normally I come for tons of clues, but I think this one gave enough clues to every step to keep moving. Prost and Cheers!

    Hack The Box
    OSCP, GWAPT, GCIH, CISSP, Sec+ ||||| Starting Mar 20: AWAE
    parityinfosec.com

  • @imag1ne thanks man, great to hear :smile:
  • i love this box more than i love myself, thank you @VbScrub

    v1ew-s0urce.flv
Sign In to comment.