I am having issues with my user/root flags. They are saying incorrect for whatever reasons. Is anyone else experiencing similar issues? I think HTB has a flaw in their dynamic flag implementation or something.
@TazWake likes to remind peopel that HTB can’t fix the problem unless they know there is a problem. PUT IN A TROUBLE TICKET!
Initial foothold: a lot of time lost to identify the way, resolved using it locally. then a small wall for me using the wrong syntax (using single command without prompt)
User: enough fast to get. it’s a system migration, so…
root: nothing new to identify the way and abuse it
I successfully uploaded a war file via CLI but I get error 404 when I browse to it
What message do you receive after successfully uploading the war file? It should specify the path for you such as “OK - Deployed **************** [/bah]”
I am having issues with my user/root flags. They are saying incorrect for whatever reasons. Is anyone else experiencing similar issues? I think HTB has a flaw in their dynamic flag implementation or something.
@TazWake likes to remind peopel that HTB can’t fix the problem unless they know there is a problem. PUT IN A TROUBLE TICKET!
I’ve been trying for hours to upload a war file with curl, but all I get is a “401 - Unauthorized”. Is there another user apart from t****t that i need to find to get there or did I just messed up the commands?
I’ve been trying for hours to upload a war file with curl, but all I get is a “401 - Unauthorized”. Is there another user apart from t****t that i need to find to get there or did I just messed up the commands?
Probably the syntax of your command, you have the correct user to do the job as it has the manager-script role.
Rooted. It was a amusing box.
Foothold: The devil is in the details. If you can’t find something, try compiling the correct list of files.
User: Country roads, take me home
Root: You will see it right away.
PM for hints
Nice machine straight forward once you get foothold.
Some hints where I got stuck for hours (#1 & #2):
What everyone’s looking for: don’t trust what you see … look behind the curtain or use something else which doesn’t need eyes [I probably hit it tens of times but dismissed it … decided to f**z it and was surprised]
Foothold: Do it old school; like vi is to notepad.
The initial vuln was very CTF-y imo, just because it is so blatant, that being said I do know there are vulnerabilities like that so I dont really have any complaints. The foothold was by far the hardest part. Both user and root were pretty good and straight forward. Respect to @Xiotis for correcting my tunnel vision with user of all things.
Hints:
Foothold: For gods sake install the software, or at least look up file paths for the thing you know you want to find. Keep in mind you might have found it but your browser might not be cooperating. If there only was some way to view the source your response
User: find that interesting file, in a place you know exists. Find out how to open it and then use that info elsewhere
Good machine. If you are stuck with l** not finding the i**** or other strange errors, don’t try to run the commands from /tmp/ but from some user folder.