Official Buff Discussion

I still need a nudge… :frowning:

Rooted! Feel free to Message for help.

I got stuck with root because I could not get ports working correctly – Make sure you use netstat to identify issues.

phew, just got the root.

actually root is easy, just because I think it’s too complicated…

I am hanging on user, idk what to do, I have no problem with challenges but these machines i can’t solve, can someone help me?

Type your comment> @amcstoke said:

I am unable to run command for the exploit. “python” command is showing importerror: no module named request and “python3” is showing errors with the code itself. I have seen videos of people doing the exact same thing but not working for me? Sorry, beginner at this. Thank you.

Hey first run the command

1.apt-get install python-pip

2.pip install requests

it worked for me.
hope it does for you.

I’m facing an error with SPOILER REMOVED exploit. Eveytime I run the command it says connection refused . A small help is appreciated.

Type your comment> @dojoku said:

phew, just got the root.

actually root is easy, just because I think it’s too complicated…

hey can you help me? while running SPOILER REMOVED exploit im facing connection refused error.

@Divyaraj said:

Type your comment> @dojoku said:

phew, just got the root.

actually root is easy, just because I think it’s too complicated…

hey can you help me? while running SPOILER REMOVED exploit im facing connection refused error.

Chances are high that you haven’t set up the connection correctly.

If you have, then the chances are high that the service has fallen over from millions of attempted exploits.

Type your comment> @TazWake said:

@Divyaraj said:

Type your comment> @dojoku said:

phew, just got the root.

actually root is easy, just because I think it’s too complicated…

hey can you help me? while running SPOILER REMOVED exploit im facing connection refused error.

Chances are high that you haven’t set up the connection correctly.

If you have, then the chances are high that the service has fallen over from millions of attempted exploits.

I have had downloaded the SPOILER REMOVED exploit for the rootflag in a python file and for instance say im listening on port 4444 by the command nc -nvlp 4444 and when i try to run the python script by python [filename].py it says [errorno111] connection refused. Thanks.

connect to [10.10.14.169] from (UNKNOWN) [10.10.10.198] 50252
Microsoft Windows [Version 10.0.17134.1610]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Windows\system32>whoami
whoami
buff\administrator

Finally rooted machine

Type your comment> @kukre said:

connect to [10.10.14.169] from (UNKNOWN) [10.10.10.198] 50252
Microsoft Windows [Version 10.0.17134.1610]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Windows\system32>whoami
whoami
buff\administrator

Finally rooted machine
Didnt you got connection refused error?

@Divyaraj said:

Didnt you got connection refused error?

The error is because the exploit you are using is looking for a service on a port on your machine. It is unlikely to be running so you get a connection refused.

You need to make sure there is a way for your machine to talk to the vulnerable service. Just running the exploit won’t work.

Type your comment> @Divyaraj said:

Type your comment> @kukre said:

connect to [10.10.14.169] from (UNKNOWN) [10.10.10.198] 50252
Microsoft Windows [Version 10.0.17134.1610]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Windows\system32>whoami
whoami
buff\administrator

Finally rooted machine
Didnt you got connection refused error?

I had no problem now, before it was a bit complicated for me but google helped me a lot

i got stuck in “Root” port forwarding plink or chisel which one is best

@scorpion4347 said:

i got stuck in “Root” port forwarding plink or chisel which one is best

Both are effective, they are just used in slightly different ways.

I used the first one, other people used the second.

Type your comment> @TazWake said:

@Divyaraj said:

Didnt you got connection refused error?

The error is because the exploit you are using is looking for a service on a port on your machine. It is unlikely to be running so you get a connection refused.

You need to make sure there is a way for your machine to talk to the vulnerable service. Just running the exploit won’t work.

Sorry for the trouble mate but its hard for me to understand that So if you dont mind can ou just help me with the simplest example possible.

I can’t do anything… used some dirbuster, but everything that’s not mentioned on the main page is either 403 or has an error in its code. Should I read something?

Type your comment> @gunroot said:

Type your comment> @Style7076 said:

Hi Guys,

i am a newbie here. i have a question to ask for buff machine. Below is the problem where i struck.

root@kali:~/Desktop/Buff# python exploit.py http://10.10.10.198:8080
Traceback (most recent call last):
File “exploit.py”, line 37, in
import requests, sys, urllib, re
ImportError: No module named requests

If so, you don’t have that python module in your machine. Google about it and know how to solve it. Pip will help you.

thank for the advise.

@Divyaraj said:

Sorry for the trouble mate but its hard for me to understand that So if you dont mind can ou just help me with the simplest example possible.

Ok if you have a machine which has a webserver listening on port 80 but it is configured to only listen to internal traffic this presents a problem for you launching attacks on your machine.

You can solve this in a few ways, one is to set up port forwarding from the server to your machine. Then, for example, you can hit a port on your machine and traffic is sent to the port on the remote box.

@MilesIwakura said:

I can’t do anything… used some dirbuster, but everything that’s not mentioned on the main page is either 403 or has an error in its code. Should I read something?

Yeah, you need to read the content of the webpages. It tells you what you need to look for to exploit the box.