Official Tabby Discussion

Rooted! Looking back, it was an easy machine, but don’t make my mistakes or you’ll spend a lot of time becoming crazy.

For foothold, the best way is to recreate the box conditions locally. Use a common package manager instead of downloading files from the website. To own the user, don’t forget to check anything you find. I didn’t (I thought that it was a rabbit hole) and spent much more time than needed. Remember this is a box marked easy, so don’t overcomplicate. Checking owners will also be helpful not to miss the right file. Then getting the root flag will be easy if you google right yourself.

If you need help, feel free to PM me.

Oh, and last but not least: STOP RESETTING THIS MACHINE. IT WORKS PERFECTLY. AND ALSO STOP OVERWRITING FILES: THERE IS AN AWESOME INVENTION CALLED “APPENDING STRINGS”. USE IT.

Hi,

it’s possible to get some hints for privilege escalation from UID:997 to UID: 1000 ?
After a few hours of research I have not yet noticed anything interesting … obviously … to my limited knowledge
Even in PM, like: “study this topic …”

Thanks

[EDIT]

Thanks to: 0ryuk0, oxybro, y4th0ts, sulcud for your support.

Spoiler Removed

Type your comment> @termtype said:

I am having issues with my user/root flags. They are saying incorrect for whatever reasons. Is anyone else experiencing similar issues? I think HTB has a flaw in their dynamic flag implementation or something.

@TazWake likes to remind peopel that HTB can’t fix the problem unless they know there is a problem. PUT IN A TROUBLE TICKET!

got root

Initial foothold: a lot of time lost to identify the way, resolved using it locally. then a small wall for me using the wrong syntax (using single command without prompt)
User: enough fast to get. it’s a system migration, so…
root: nothing new to identify the way and abuse it

PM me if you need some hits

Type your comment> @ReverseBrain said:

I successfully uploaded a war file via CLI but I get error 404 when I browse to it

What message do you receive after successfully uploading the war file? It should specify the path for you such as “OK - Deployed **************** [/bah]”

Type your comment> @ReverseBrain said:

I got access to host-manager panel but I don’t find a way to upload files…

Actually u can access anything else too for upload something

Rooted.
Nice box, there isn’t much I can add that hasn’t already been said about foothold.

The priv esc to root is nice, haven’t seen that before.

Type your comment> @zer0bubble said:

Type your comment> @termtype said:

I am having issues with my user/root flags. They are saying incorrect for whatever reasons. Is anyone else experiencing similar issues? I think HTB has a flaw in their dynamic flag implementation or something.

@TazWake likes to remind peopel that HTB can’t fix the problem unless they know there is a problem. PUT IN A TROUBLE TICKET!

Well, duh, I did PUT IN A TROUBLE TICKET, weeks ago actually!
https://hackthebox.atlassian.net/servicedesk/customer/portal/1/HBS-6687

:wink:

This was on Magic box though, had the same problem. It has something to do with the dynamic flags they’ve implemented. :slight_smile:

I’ve been trying for hours to upload a war file with curl, but all I get is a “401 - Unauthorized”. Is there another user apart from t****t that i need to find to get there or did I just messed up the commands?

Type your comment> @7h3B4dg3r said:

I’ve been trying for hours to upload a war file with curl, but all I get is a “401 - Unauthorized”. Is there another user apart from t****t that i need to find to get there or did I just messed up the commands?

Probably the syntax of your command, you have the correct user to do the job as it has the manager-script role.

rooted last night. Fun box, all downhill from after the foothold, but really interesting PE :slight_smile:

Rooted. DM for any nudges :slight_smile:

Rooted. It was a amusing box.
Foothold: The devil is in the details. If you can’t find something, try compiling the correct list of files.
User: Country roads, take me home
Root: You will see it right away.
PM for hints

Finally Rooted. PM me if you need any nudge, I like to help :smile:

Stuck after getting the shell, any hint that gives me an idea of what file should i look for? spent hours browsing the whole machine xD

Man ROOTED FINALLY !!!
s/o to @dhruvarora @razntwn for helping me !

PM me if you need nudge !

@razntwn said:

Nice machine straight forward once you get foothold.

Some hints where I got stuck for hours (#1 & #2):

  1. What everyone’s looking for: don’t trust what you see … look behind the curtain or use something else which doesn’t need eyes [I probably hit it tens of times but dismissed it … decided to f**z it and was surprised]
  2. Foothold: Do it old school; like vi is to notepad.
  3. User: … (straight forward)
  4. Root: … (straight forward)

PM if I can help.

Huge +1!

Got root.

The initial vuln was very CTF-y imo, just because it is so blatant, that being said I do know there are vulnerabilities like that so I dont really have any complaints. The foothold was by far the hardest part. Both user and root were pretty good and straight forward. Respect to @Xiotis for correcting my tunnel vision with user of all things.

Hints:

Foothold: For gods sake install the software, or at least look up file paths for the thing you know you want to find. Keep in mind you might have found it but your browser might not be cooperating. If there only was some way to view the source your response

User: find that interesting file, in a place you know exists. Find out how to open it and then use that info elsewhere

root: enum + google

If you need additional help feel free to pm me

Got root finally.
Can’t add more than what’s already in here without giving spoilers, so feel free to pm me.