Finally got root on this one…i could not get the U** S** route to work though. The alternative route is a great enum and research option. Learned quite a bit working on this one! Much thanks, @mrb3n
C:\Windows\system32>whoami
nt authority\system
C:\Windows\system32>systeminfo
Host Name: REMOTE
This is my first. I have managed to get the file and have find user credentials but do not know how to find password. Assuming they are encrypted. Anyone point me in the right direction?
For the TV exploit, could someone point me to the best way to run a python exploit on a Windows box? What did you do?
Yes, I know there’s metasploit, but who did the exploit without MSF? Any tips would be very appreciated.
Thanks!
This is the problem I’m having. I am confident I am super close to getting root, but these are my dilemmas regarding the two methods that seem to be hinted are in this thread:
TV exploiit: the box doesn’t have Py in order to run the exploit. I went as far as dropping a “portable” version of it, but it has to be version 2 which doesn’t appear to have such a version and I can’t seem to get it to install, which I wasn’t expecting to work anyway.
Un****** Se****: I keep getting this message, NoMethodError undefined method `extapi’
Edit: So I figured out a way to run Py “remotely” and I think this is the direction I’m supposed to be going in, but it is telling me the command ran without returning a result. Still chipping away.
This is the problem I’m having. I am confident I am super close to getting root, but these are my dilemmas regarding the two methods that seem to be hinted are in this thread:
TV exploiit: the box doesn’t have Py in order to run the exploit. I went as far as dropping a “portable” version of it, but it has to be version 2 which doesn’t appear to have such a version and I can’t seem to get it to install, which I wasn’t expecting to work anyway.
You are over-complicating things, here. You can grab useful information with built-in Windows tools, and then do the “heavy lifting” on your own machine
Feel free to PM me, if you have questions.
Traceback (most recent call last): File “secretnameofthisexploit.py”, line 54, in VIEWSTATE = soup.find(id=“__VIEWSTATE”)[‘value’] TypeError: ‘NoneType’ object is not subscriptable
Hey guys i have this issue on my kali. I can use exploit from my main OS anyway i want to fix this issue on kali.
Is there some1 who know how to fix it ? date seems to be okey
nudges++
Finally rooted using U****C user was actually way easier for me than root. Learned some for root, definitely a fun box. I think ill try through TV now. PM me for nudges.
Finally rooted this box. It took me way longer than it should have because I was being an idiot for the first couple days. I used the TV method. Not entirely sure what the U****C thing I’ve been seeing is, I’ll have to look into that.
Root was much easier than User, it just takes basic enumeration and then knowing what to do with the PW. Thanks for the nice box, @mrb3n.
Has this box been out and retired once already? I found a total walkthrough for it online…
What @HomeSen has said is 100% correct (as usual). If you find a write up for a HTB machine you can, if you want, report it to HTB. You can remind the author of the ToS for HTB or you can ignore it.
I am curious how people find these write-ups without actively searching for the box name and write up.
I am curious how people find these write-ups without actively searching for the box name and write up.
Well I can tell you in my case I was getting an error when I was futzing with a certain service on the host, and while Googling for the error I found someone posted a comment, complaining about the same thing, to a web site which had a full walkthrough. I’m reporting it to HTB, but the walkthrough was posted in mid/late May, so it’s been out there a while.