[JET] Fortress

Ok, so I’m up to Auth Bypass. :smile: SQLI is one of my biggest weaknesses so I excitedly thought this would be an excellent opportunity to learn. I have made some slow progress but am now at a bit of a dead end and need to ask for a (hopefully) small prod.
My status is that i have a vulnerable form (lp). Using a 'U S*T’ query with 3 fields, I have r/w on one field. I can also use that field to call functions (db name, make pw hashes, etc…). The problem I am struggling to overcome, is that the ‘cheatsheet’ approach of using password() (or md5(), sha1()…) to ‘force’ a known password hasn’t worked (in a large number of permutations). I also have not managed to nest queries or even figure out a way to enumerate the db schema via the single field I can control and view. Can somebody provide a source of knowledge (or just an angle of thought) where I can learn what is it I am missing?
Many thx in advance.

edit: NM, an ippsec video put me onto the right tool… :wink:

Type your comment> @FlatMarsSociet said:

Type your comment> @idevilkz said:

ola, just started on this today.
I can’t believe that I can’t even get connected :frowning:
I have found 2 ports where I can ****et to and it lets me some info out but thats about it. unsure on what to do there. little push will be appreciated.

Check the levels and start with the first one.
You’ll need to do at least 1-5 in order before you can do 6+.

As with most CTFs, the name of the challenge might give you a hint at where to look.

thanks @FlatMarsSociet I have made some progress and on to Going Deeper

So I’m working on #8, skipping #6 and #7 for the moment.

For this, I found that the publicly accessible port gives me some information, but I can’t seem to find a method to extract the exact info I need.
I thought it might be useful to connect to a different port (*200), but this one is only accessible to localhost. So I need to do some forwarding.
Could someone help me with the command I’m running via what I found in #5?

I’m trying to get it to work using s***t

Pesky 504’s are killing me

EDIT: looks like I might have to do Overflow first?
EDIT: finished Overflow, but still having issues

1 Like

So like many people that have posted here I have used dig in every configuration that I can think of and have still had no luck. If someone could provide a helping hand it would be most appreciated. Please PM me.

Hi :slight_smile: I stuck on “more secrets” edit … is ok

Hi, any help for elasticity ? (The last flag to finish the lab for me)

@christrc said:
Hi, any help for elasticity ? (The last flag to finish the lab for me)

I think my post 3 posts above yours might give you a hint.
In return, you could perhaps give me a hint on how to get over my issue? :wink:

ok I think I am nearly there with overflow however I am unable to get my code working.
I am still for the life of me can’t get a reverse shell on to jet, tried netcat, socat and whichever.

for overflow, I am running using burp with socat however, failing.

@FlatMarsSociet I’m on same point :pensive: :slight_smile:

so it took me over 2 days to get my head around buffer overflows and with help from @FlatMarsSociet and @EvilT0r13
I have had good success with other parts however, I am now stuck with following three

Elasticity
Member Manager
Memo - i have a rough idea of what that is

unable to get a reverse shell from web … any nudges pls ?

which part Command ? PM

@B3ard3d said:

So like many people that have posted here I have used dig in every configuration that I can think of and have still had no luck. If someone could provide a helping hand it would be most appreciated. Please PM me.

I got stuck in overflown, I have the file l***. Any nudges please

Type your comment> @nitinrkz said:

unable to get a reverse shell from web … any nudges pls ?

Nobody says you’re supposed to get a revshell

Type your comment> @FlatMarsSociet said:

Type your comment> @nitinrkz said:

unable to get a reverse shell from web … any nudges pls ?

Nobody says you’re supposed to get a revshell

Huh?

roo@kali:~/hack_the_box/machines$ nc -nvlp 8081
listening on [any] 8081 …
connect to [10.13.14.11] from (UNKNOWN) [10.13.37.10] 36820
bash: cannot set terminal process group (1304): Inappropriate ioctl for device
bash: no job control in this shell
www-data@jet:~/REDACTED$

Type your comment> @FlatMarsSociet said:

Type your comment> @nitinrkz said:

unable to get a reverse shell from web … any nudges pls ?

Nobody says you’re supposed to get a revshell

hey I actually managed to get one :wink: had to do some tricks but finally :smiley:

Apart from that , Any tutorials i can use for overflows ?

could anyone provide a nudge on the Command? I identified an interesting function in SC but I haven’t had any luck exploiting it. Thanks in advance.

Type your comment> @roowashere said:

Type your comment> @FlatMarsSociet said:

Type your comment> @nitinrkz said:

unable to get a reverse shell from web … any nudges pls ?

Nobody says you’re supposed to get a revshell

Huh?

roo@kali:~/hack_the_box/machines$ nc -nvlp 8081
listening on [any] 8081 …
connect to [10.13.14.11] from (UNKNOWN) [10.13.37.10] 36820
bash: cannot set terminal process group (1304): Inappropriate ioctl for device
bash: no job control in this shell
www-data@jet:~/REDACTED$

It’s not because you can, that you really need to.
Sometimes people get stuck looking for a way to get a revshell, while everything they need is right in from of them

Type your comment> @FlatMarsSociet said:

Type your comment> @roowashere said:

Type your comment> @FlatMarsSociet said:

Type your comment> @nitinrkz said:

unable to get a reverse shell from web … any nudges pls ?

Nobody says you’re supposed to get a revshell

Huh?

roo@kali:~/hack_the_box/machines$ nc -nvlp 8081
listening on [any] 8081 …
connect to [10.13.14.11] from (UNKNOWN) [10.13.37.10] 36820
bash: cannot set terminal process group (1304): Inappropriate ioctl for device
bash: no job control in this shell
www-data@jet:~/REDACTED$

It’s not because you can, that you really need to.
Sometimes people get stuck looking for a way to get a revshell, while everything they need is right in from of them

That’s fair. In this case, a revshell provided no more towards the objective than was already available. A ‘distraction’, as you say.

Thanks for the timely reminder.