Cache

1568101116

Comments

  • edited May 2020

    Cool! Foothold was most "annoying" part.
    The rest was really easy.
    From login to root took less than 1 hour and half.

    Honestly I would rate this a green machine!

    Little help, if you're stuck on H** login page, use Google to get info on the running service. DuckDuckGo won't give what you need.

    For nudges PM.

    Hack The Box

  • Phew!!...finally. I think I took the long way round but I eventually managed to get root. I won't leave any hints here because what's already here will get you there (eventually). I certainly wouldn't have got here without the hints so thanks to all you smart cookies.

  • That was a lot of fun, especially the path to root. Straightforward if you know the tech, else you'll need some research. Thanks to the box creator.

    corpnobbs
    OSCP | OSWP | so much more to learn ...

  • I've been experiencing severs connection problems (I cannot reach the p***** or any other site on port 80) every 2 minutes on vip with that box, does anyone else have a similar problem?

  • Type your comment> @mrvanee said:
    > Well this sucks. on the login page there is now just a PHP shell... Don't know who did that :\

    They call themselves hackers..I thought part of it was being covert?? I snuck a nice webshell somewhere that's very well hidden and disguised so I have a backdoor.

    Hack The Box

    More than happy to help out and give hints - sorry if you've messaged me on forum.htb and I haven't got back, I might be more reachable via discord: CRYP70🇦🇺#8985

  • How come the vulnerabilities are not in Searchsploit ?

    lebutter
    eCPPT | OSCP

  • Type your comment> @mA1nfrAm3r said:

    I've been experiencing severs connection problems (I cannot reach the p***** or any other site on port 80) every 2 minutes on vip with that box, does anyone else have a similar problem?

    I got it, but after awhile the site got back. i think the server got spammed with dirbusters

  • Type your comment> @lebutter said:

    How come the vulnerabilities are not in Searchsploit ?

    The one that gets you the shell is. The one that gets you the details is in Metasploit but i would not use it. It is painfully slow

  • I thought those were for older versions than the one running

    lebutter
    eCPPT | OSCP

  • edited May 2020

    Type your comment> @CyberG33k said:

    Type your comment> @lebutter said:

    How come the vulnerabilities are not in Searchsploit ?

    The one that gets you the shell is. The one that gets you the details is in Metasploit but i would not use it. It is painfully slow

    Can fucking confirm, it is painfully slow

    Someone plz DM me with better way :(

  • Can anyone nudge for initial foothold? Have the username from author page, but pretty lost from there

  • Finally got root :smiley:
    if anyone needs help PM

  • finally rooted Cache .. was tricky and easy as well ... need some enumeration and thenn enumeration and then enumeration.. finally some shell and rootrd..!!!!
    Thanx alot @itachi982 for your wonderfull support

    PM for any support or help.

  • Type your comment> @ellj said:

    Type your comment> @CyberG33k said:

    Type your comment> @lebutter said:

    How come the vulnerabilities are not in Searchsploit ?

    The one that gets you the shell is. The one that gets you the details is in Metasploit but i would not use it. It is painfully slow

    Can fucking confirm, it is painfully slow

    Someone plz DM me with better way :(

    If you look at the code , and you did enough enumeration to understand what tables you want, you can modify the metasploit module to only download the table you want. You should be able to figure it out and download the table if far less time that waiting for it to complete.

  • Type your comment> @CyberG33k said:

    Type your comment> @ellj said:

    Type your comment> @CyberG33k said:

    Type your comment> @lebutter said:

    How come the vulnerabilities are not in Searchsploit ?

    The one that gets you the shell is. The one that gets you the details is in Metasploit but i would not use it. It is painfully slow

    Can fucking confirm, it is painfully slow

    Someone plz DM me with better way :(

    If you look at the code , and you did enough enumeration to understand what tables you want, you can modify the metasploit module to only download the table you want. You should be able to figure it out and download the table if far less time that waiting for it to complete.

    I did that and it still took me easily 30min... i'm now doing it the intended way which is interesting.

    lebutter
    eCPPT | OSCP

  • I have the pass and salt from the table but is it normal that the former is that short?

  • web broken and no reboots allowed until tomorrow :(. Now that i am moving forward..

  • greate experience, gotta admit i asked for help because i didn't read the comments at first, always read the comments

  • edited May 2020

    Type your comment> @luca76 said:

    you have to do something it is not possible so, the riane box up only for a few seconds and then down again

    Yeah, definitely... :-(
    Here's the situation, at the moment:

    WARNING: Failed to daemonise. This is quite common and not fatal.

    Connection refused (111)

  • edited May 2020

    Finally

    [email protected]:~# id && hostname && date
    uid=0(root) gid=0(root) groups=0(root),
    cache
    Tue May 12 21:38:01 UTC 2020

    Foothold and user were both abominable pains because of the instability of this box.

    Learned something new with both phases of root privesc though, which I appreciated.

    The best hints are already out there.

    ph03nix0x90

  • Got root. Yay! I think getting the foothold was the hardest part. I ended up modifying the metasploit to do it as I could not get the other way to work.

  • you broke the balls, because you always reset, so it is impossible, you have to take measures in my opinion

    Hack The Box

  • Type your comment> @syn4ps said:

    I have the pass and salt from the table but is it normal that the former is that short?

    I have the same issue. Rabbit hole maybe? I dunno what to think anymore with the portal getting turned off so often.

    Hack The Box

  • Phheew that was a long foothold process. I don't know how the first bloods do it so quick, as on this one the perimeter is quite wide, many things to check.

    lebutter
    eCPPT | OSCP

  • Hmmmm found other vhost. Wondering if par**** por*** should be turned off by default? 🤔

    or where i should go from here?

    any tips?

    zweeden

  • Any Hints on foothold. I just have username and can see n**.h*** page so far. I tried the h*s in author page as vhost but didn't found.

    s1lv3rst4r

  • edited May 2020

    Type your comment> @tilznit said:

    Type your comment> @syn4ps said:

    I have the pass and salt from the table but is it normal that the former is that short?

    I have the same issue. Rabbit hole maybe? I dunno what to think anymore with the portal getting turned off so often.

    ah, so when it is off, it is not really intented? It can be on sometimes? oO

    I don't think it is a rabbit hole as people here got it with the metasploit module. I have'nt changed the script, I just checked what it does through Burp and applied the same for the interesting table.

    EDIT: OK, after reset the portal is available... Got everything I need

  • Type your comment> @ic3x64 said:

    Rooted, need help, let me know.

    I got two users, stuck on root

  • Turning off the portal has no effect in getting foothold as long as you know which page to go. If you want to see the portal, although there's nothing much to see, reset the machine. I'd suggest visiting the official wiki. Tons of information there. Remember, it's about having fun in learning and expanding your knowledge, not how fast you can root the machine.

    Cheers

    limbernie
    Write-ups | Discord - limbernie#0386

  • finally rooted. thanks @itachi982 @calipendula for your hints

Sign In to comment.