Could use a nudge for root. Focusing on TV but my enum shows no vuln or exploit for that version. Had a look relevant directories and files for hashes but cant find a path forward.
Thanks =)
Could use a nudge for root. Focusing on TV but my enum shows no vuln or exploit for that version. Had a look relevant directories and files for hashes but cant find a path forward.
Thanks =)
What is the mushroom to Mario in Super Mario Bros.
Could use a nudge for root. Focusing on TV but my enum shows no vuln or exploit for that version. Had a look relevant directories and files for hashes but cant find a path forward.
Thanks =)
What is the mushroom to Mario in Super Mario Bros.
Ok, but when I tried running it, it didn’t work. I was In PS but the shell was inside MSF session. I don’t know if that matters.
Thanks for the tip @3rpleThr3at ! I used it to get the root txt but unsure how to actually get a session as Admin, do you mind PM’ing me how you went about this?
Edit: Cancel that, I spoke too soon. It seems like the command param that I use just doesn’t seem to work, tried every possible syntax. Could it be the newer version of this ‘Mushroom’?. Further tests and I’m pretty sure the Mushroom isn’t working. Can you PM me to help me trouble shoot?
I found U******o, then I realize the mount part but after enum so hard, I swear I’ve open all possible files, can´t get any file of interest wich help me to the CVE.
Thanks for the tip @3rpleThr3at ! I used it to get the root txt but unsure how to actually get a session as Admin, do you mind PM’ing me how you went about this?
Edit: Cancel that, I spoke too soon. It seems like the command param that I use just doesn’t seem to work, tried every possible syntax. Could it be the newer version of this ‘Mushroom’?. Further tests and I’m pretty sure the Mushroom isn’t working. Can you PM me to help me trouble shoot?
Let us know how that goes please. Paddling down the same creek here.
Rooted. Good machine, really helped me with learning more about Windows enum. Used the u****c method. Stuck for a long time just fixing bad syntax, but in the end the method I used wasn’t overly complicated.
Hey,
I am not looking for any hint at all, (tired of this) I am asking the people who are more familiar with Windows pen-testing.
Is there any book/course that I can learn about the Windows environment and its services? Or experience is the key here?
Thanks ?
Highly appreciated.
Did they ever release part 2 of that? I got part 1 back in 2017 but just had a look on amazon and it says part 2 was released in April this year but it also says it hasn’t been released yet :s
Also I will say that these books are very in depth and not really for beginners. I also don’t know if they’d be that much use for general pentesting stuff really. They’re mostly all about how the OS works at the kernel level, so if you’re going to be specialising in discovering exploits in that area then definitely grab a copy, but lets face it most of us are not doing that.
Hey folks, I started this machine today. I got the user after a couple of hours. I am stucked rooting it.
I have the low priv shell but when I execute any ps batch file or command I get no text prompt, it just stays empty(no error) or just crash the shell. So I can upload things but not execute them so it is kind of weird: the shell is useless!
I would appreciate any hint or just to know if anyone is having this issue…
Did they ever release part 2 of that? I got part 1 back in 2017 but just had a look on amazon and it says part 2 was released in April this year but it also says it hasn’t been released yet :s
I’ve been wondering about this. I have (had?) it on pre-order and while the website says released 23 April, it also says out of stock and I certainly don’t have my copy yet (nor any emails from Amazon but I assume they are fairly messed up right now).
(and, as well as discovering exploits, it’s a pretty ■■■■ good set of books if you need to do forensics on Windows machines).
Hint decrypting hashes!
I’ve found the strange dangerous file and some hashed creds.
Having no joy getting anything from these…
All the ones I found on this box should crack.
If this is working towards user, and its from a the U******.*** file then you need to be careful which characters you extract but you do get confirmation on the format.
I like that box, I didn’t solve it by TV* ,although I got it’s ID and Pass but didn’t figure how to continue that way … So please If any one can PM for that path will be very appreciated … Thanks for the creator … I can say that box is one of real cases outside really.