Official Buff Discussion

Type your comment> @cybeR0ot said:

Piece of Cake :smile: but im having real difficulty in uploading the files after initial shell. Is it just me who is facing this issue?

Yeah I had a few issues uploading files to this box.
Fixed it by just changing servers really.

Rooted!! Great box! Most of the hints are in the forums but if I had to recap-
User: Enumerate harder, maybe the webpage has something that says something that might be worth a google or two…
Root: Look for files that users usually forget to delete and google around. Of coarse you must be required to tweak the exploit to run what you want it to. Remember not all computers are the same especially with their “internet ID”. You’ll figure it out and if doesn’t work the first time, keep running it and if it still doesn’t perhaps change the payload around until it works. Also remember that even basic av can detect extremely common payloads.

I still need a nudge… :frowning:

Rooted! Feel free to Message for help.

I got stuck with root because I could not get ports working correctly – Make sure you use netstat to identify issues.

phew, just got the root.

actually root is easy, just because I think it’s too complicated…

I am hanging on user, idk what to do, I have no problem with challenges but these machines i can’t solve, can someone help me?

Type your comment> @amcstoke said:

I am unable to run command for the exploit. “python” command is showing importerror: no module named request and “python3” is showing errors with the code itself. I have seen videos of people doing the exact same thing but not working for me? Sorry, beginner at this. Thank you.

Hey first run the command

1.apt-get install python-pip

2.pip install requests

it worked for me.
hope it does for you.

I’m facing an error with SPOILER REMOVED exploit. Eveytime I run the command it says connection refused . A small help is appreciated.

Type your comment> @dojoku said:

phew, just got the root.

actually root is easy, just because I think it’s too complicated…

hey can you help me? while running SPOILER REMOVED exploit im facing connection refused error.

@Divyaraj said:

Type your comment> @dojoku said:

phew, just got the root.

actually root is easy, just because I think it’s too complicated…

hey can you help me? while running SPOILER REMOVED exploit im facing connection refused error.

Chances are high that you haven’t set up the connection correctly.

If you have, then the chances are high that the service has fallen over from millions of attempted exploits.

Type your comment> @TazWake said:

@Divyaraj said:

Type your comment> @dojoku said:

phew, just got the root.

actually root is easy, just because I think it’s too complicated…

hey can you help me? while running SPOILER REMOVED exploit im facing connection refused error.

Chances are high that you haven’t set up the connection correctly.

If you have, then the chances are high that the service has fallen over from millions of attempted exploits.

I have had downloaded the SPOILER REMOVED exploit for the rootflag in a python file and for instance say im listening on port 4444 by the command nc -nvlp 4444 and when i try to run the python script by python [filename].py it says [errorno111] connection refused. Thanks.

connect to [10.10.14.169] from (UNKNOWN) [10.10.10.198] 50252
Microsoft Windows [Version 10.0.17134.1610]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Windows\system32>whoami
whoami
buff\administrator

Finally rooted machine

Type your comment> @kukre said:

connect to [10.10.14.169] from (UNKNOWN) [10.10.10.198] 50252
Microsoft Windows [Version 10.0.17134.1610]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Windows\system32>whoami
whoami
buff\administrator

Finally rooted machine
Didnt you got connection refused error?

@Divyaraj said:

Didnt you got connection refused error?

The error is because the exploit you are using is looking for a service on a port on your machine. It is unlikely to be running so you get a connection refused.

You need to make sure there is a way for your machine to talk to the vulnerable service. Just running the exploit won’t work.

Type your comment> @Divyaraj said:

Type your comment> @kukre said:

connect to [10.10.14.169] from (UNKNOWN) [10.10.10.198] 50252
Microsoft Windows [Version 10.0.17134.1610]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Windows\system32>whoami
whoami
buff\administrator

Finally rooted machine
Didnt you got connection refused error?

I had no problem now, before it was a bit complicated for me but google helped me a lot

i got stuck in “Root” port forwarding plink or chisel which one is best

@scorpion4347 said:

i got stuck in “Root” port forwarding plink or chisel which one is best

Both are effective, they are just used in slightly different ways.

I used the first one, other people used the second.

Type your comment> @TazWake said:

@Divyaraj said:

Didnt you got connection refused error?

The error is because the exploit you are using is looking for a service on a port on your machine. It is unlikely to be running so you get a connection refused.

You need to make sure there is a way for your machine to talk to the vulnerable service. Just running the exploit won’t work.

Sorry for the trouble mate but its hard for me to understand that So if you dont mind can ou just help me with the simplest example possible.

I can’t do anything… used some dirbuster, but everything that’s not mentioned on the main page is either 403 or has an error in its code. Should I read something?

Type your comment> @gunroot said:

Type your comment> @Style7076 said:

Hi Guys,

i am a newbie here. i have a question to ask for buff machine. Below is the problem where i struck.

root@kali:~/Desktop/Buff# python exploit.py http://10.10.10.198:8080
Traceback (most recent call last):
File “exploit.py”, line 37, in
import requests, sys, urllib, re
ImportError: No module named requests

If so, you don’t have that python module in your machine. Google about it and know how to solve it. Pip will help you.

thank for the advise.