Stuck on finding tc-u****.l . I have tried possible paths as suggested, tried path after running it locally and even read tc**.s****** file with L** however ,even that path failed.
Stuck on finding tc-u****.l . I have tried possible paths as suggested, tried path after running it locally and even read tc**.s****** file with L** however ,even that path failed.
Any nudges would be greatly appreciated.
don’t use guides to install it, just install it
and when you try in htb pay attention to the response (a tool allows you to easily see it if you can’t see it)
i’m blocked on the next step… failing to start something after correctly sending it… maybe i need to understand something about VH before using it?
Been stuck on finding the x*l file path for a couple days. Have installed everything locally and know where it ‘should’ be. Can someone help me out. Thanks
Finally completed this box and I have to say, not the easiest ‘easy’ box I’ve ever done mainly due to difficulty actually finding certain key files but I guess that would be like real life. Once the key files are found the next steps could be considered easy.
Many thanks to @syro and @gunroot for the nudges that got me there.
User: Enum services, search any suspect files/situations, try to grab creds, some files you can’t read in browser, try another way.
Root: A basic enumeration in the system will show you the way if the users stop to f******** reset the machine…
Pretty straight forward box with a few caveats where you really need to pay attention to detail. Here are my hints for those who are struggling:
Foothold: By far, the hardest part of this box. Enumerate everything you find and question how application might behave if you were to write it. If you find anything that is exploitable, think about how you may want to later abuse that. If you try re-creating this box yourself, you will be on a good path.
User: Enumerate as much as you possibly can and think of simple things system administrators often do.
Root: Try installing the same Linux distro as this box and ask yourself how your privileges have changed since the foothold.
Feel free to PM me if all this still feels too cryptic!
I’m French.
We decapitated our king, long time ago.
The next dude that resets the perfectly working box will be immediately crowned as my king.
Apart of that, what a box. I got user, on my way for root, and I never was aware that Curl could help me in those ways.
Enumeration was frankly a pain, until I just installed the service on my machine, and started learning about how it is settled, how it works and what “The war never changes” means.
I’ve tried that and pulled a few other things from files that i know will be there/accessible. They point to dirs and files that i’ve already tried with no love. I feel like i’m missing something obvious, but tried both the normal paths and stuff indicated within the system. Local install shows a clear path, but no love on the target. Just can’t get what I’m missing, been looking at it for 3 days.
@sloth1985 said:
Well, like a lot of other people on here I’m having trouble finding a certain file for the initial foothold. I’ve tried installing t****t locally as a few people have suggested and the file I am looking for is where it should be (two places in fact) but using the same path(s) on Tabby gives me nothing.
I’m a little bit stuck now.
yep, same thing man, tried fuzzing too, no love, but may be slightly off on syntax. Finding the initial vuln and knowing what i need to look for only took 30mins, but after that…nothing. Looked in several system files that indicate where stuff usually ‘lands’ but no love when trying them.
@sloth1985 said:
Well, like a lot of other people on here I’m having trouble finding a certain file for the initial foothold. I’ve tried installing t****t locally as a few people have suggested and the file I am looking for is where it should be (two places in fact) but using the same path(s) on Tabby gives me nothing.
I’m a little bit stuck now.
yep, same thing man, tried fuzzing too, no love, but may be slightly off on syntax. Finding the initial vuln and knowing what i need to look for only took 30mins, but after that…nothing. Looked in several system files that indicate where stuff usually ‘lands’ but no love when trying them.
I think the people that say it is right in front of you are a little off the mark. Yes it is on the path of one of the locations you should find fairly easily, but if you guess it you made one ■■■■ of a leap. There is a much much easier way to find the exact path with zero guessing. Think of different ways you might search for something installed on your workstation. Now think of what files it uses and access those
Stuck on finding tc-u****.l . I have tried possible paths as suggested, tried path after running it locally and even read tc**.s****** file with L** however ,even that path failed.
Any nudges would be greatly appreciated.
don’t use guides to install it, just install it
and when you try in htb pay attention to the response (a tool allows you to easily see it if you can’t see it)
i’m blocked on the next step… failing to start something after correctly sending it… maybe i need to understand something about VH before using it?
gotcha - installing confirmed why i might not be able to see what i’m looking for, but not really sure how to get around it. Will keep digging.
Got low-priv shell user - all I can say is think about what you can do with the discovered creds and pay close attention to the roles specifically. You can basically achieve the same thing with manager-script (via Curl) as you could with manager-gui to upload your rev shell; Google is your friend. Hope this helps a bit.
I’ll repost once I get the big fish - root! eZ shout Outz to zer0bubble, Rocketeer, Sloth1985, and 6h4ack for being awesome h4x0r’s and the help to get to where I am.
mind if we DM? - could use a quick nudge, been stuck for a few days (see posts just above yours.) Have an idea where i think it should be but I’m either slightly off or don’t have perms for that certain file. Trying to think how to get around that or what i’m missing.
Got low-priv shell user - all I can say is think about what you can do with the discovered creds and pay close attention to the roles specifically. You can basically achieve the same thing with manager-script (via Curl) as you could with manager-gui to upload your rev shell; Google is your friend. Hope this helps a bit.
I’ll repost once I get the big fish - root! eZ shout Outz to zer0bubble, Rocketeer, Sloth1985, and 6h4ack for being awesome h4x0r’s and the help to get to where I am.
mind if we DM? - could use a quick nudge, been stuck for a few days (see posts just above yours.) Have an idea where i think it should be but I’m either slightly off or don’t have perms for that certain file. Trying to think how to get around that or what i’m missing.
NVM i think I finally made some progress - attention to details and other variants help!