So, I’ve managed to… find a interesting place I can register.
Not sure if someone made a fake account under one of the two users but I got that.
Though, couldn’t find the next step from there. the d** gives 403… I have a idea of what I need to do but not exactly sure how to apply it.
So, I’ve managed to… find a interesting place I can register.
Not sure if someone made a fake account under one of the two users but I got that.
Though, couldn’t find the next step from there. the d** gives 403… I have a idea of what I need to do but not exactly sure how to apply it.
I am stuck at a point at user where i can read files but not all of the .php ; so far nothing i could read gave me some new information to proceed; plz pm for any nudges ; thx
There might be a filter you can use with PHP that bypasses this with a commonly used encoding format.
just a tip for web-focused testers - there is another way to get the creds, it’s related to how the backend handles some specific URLs. No need to “point the gun at yourself”.
all can be found in PayloadAllTheThings … or OWASP
Thanks for the pointer to PayloadAllTheThings, I always forget how useful this is … . Wasn’t able to construct a working exploit, but with PayloadAllTheThings it was quite easy.
I got stuck for a while on User part. Turns out it’s quite simple if you read the output, think for a bit of Time and then you’ll give it what it wants.
I’ll try to do Root in a fancier manner, since mine was a bit brute.
PM if needed
I am stuck at a point at user where i can read files but not all of the .php ; so far nothing i could read gave me some new information to proceed; plz pm for any nudges ; thx
same here… can’t find b****p folder… any nudegs… please pm …
thanks
I am stuck at a point at user where i can read files but not all of the .php ; so far nothing i could read gave me some new information to proceed; plz pm for any nudges ; thx
same here… can’t find b****p folder… any nudegs… please pm …
thanks
Have a think about where these files would be stored in a normal Linux filesystem then with a bit of trial and error you will get the folder name.
Start by working out which folder contains files to which the Linux system writes data during the course of its operation.
Then it normally has a folder which serves as a home for things posted on port 80.
the c****o is driving me crazy. I see that it is kind of broken but after an initial step without the k** I get stuck. any nudges or helpful links would be appreciated. thx.
Just finished and wanted to say thanks to the creators @infosecJack and @chivato!
Probably the most fun HTB I’ve done, I’ve learnt a lot from doing this box (even/especially the bits that ended up being rabbit holes). And thanks to @EvilT0r13 for pointing out a technique I’d completely overlooked.
Thanks for a super fun box to help with quarantine :))
the c****o is driving me crazy. I see that it is kind of broken but after an initial step without the k** I get stuck. any nudges or helpful links would be appreciated. thx.
You can write a bit of pythonic code to append to the python file which brute forces this fairly quickly.
rooted - what a crazy ride. This was a great machine; enjoyed the crypto part a lot but also user was fantastic. good work. thanks to @HomeSen and @EvilT0r13 for the hints/nudge.
the c****o is driving me crazy. I see that it is kind of broken but after an initial step without the k** I get stuck. any nudges or helpful links would be appreciated. thx.
You can write a bit of pythonic code to append to the python file which brute forces this fairly quickly.
I figured out (with some help from @HomeSen) a less brute force way to crack the msg. thx for the nudge/hint anyways, much appreciated.
This is a very difficult machine, I tried to use dirbuster to find extension xml and php, I cannot find any xml… and there is only one index.php… the directories I can find are /icons/, /icons/README and /icons/small/, hope someone can give me a nudge?