Official Compromised Discussion

@b3nd0 That’s funny lol. ??

@b3nd0 said:

@LMAY75 Yea I tried my damnedest to not ask for help, but i had to ask taz too. makes me laugh when i imagine the day he must have on here, like a drill instructor walking through a field of shananagans:

“Code with two hands boy, this isn’t a rap concert. Private, why will your exploit not fire?..your magazine is upside down son! How did YOU end up on your own botnet?”

:lol: :smile: :lol: :love:

Type your comment> @TazWake said:

@b3nd0 said:

@LMAY75 Yea I tried my damnedest to not ask for help, but i had to ask taz too. makes me laugh when i imagine the day he must have on here, like a drill instructor walking through a field of shananagans:

“Code with two hands boy, this isn’t a rap concert. Private, why will your exploit not fire?..your magazine is upside down son! How did YOU end up on your own botnet?”

:lol: :smile: :lol: :love:

As a JROTC guy I find this especially funny

@LMAY75 said:

Type your comment> @TazWake said:

@b3nd0 said:

@LMAY75 Yea I tried my damnedest to not ask for help, but i had to ask taz too. makes me laugh when i imagine the day he must have on here, like a drill instructor walking through a field of shananagans:

“Code with two hands boy, this isn’t a rap concert. Private, why will your exploit not fire?..your magazine is upside down son! How did YOU end up on your own botnet?”

:lol: :smile: :lol: :love:

As a JROTC guy I find this especially funny

To round off the comedy, 15 years ago I was a basic training sergeant/instructor.

I need a nudge. phpinfo saddened me deeply on my way to foothold and I do not know how to proceed.

@sparrow1 said:

I need a nudge. phpinfo saddened me deeply on my way to foothold and I do not know how to proceed.

There is a way to bypass the things which are disabled. Its googleable.

Type your comment> @TazWake said:

@LMAY75 said:

Type your comment> @TazWake said:

@b3nd0 said:

@LMAY75 Yea I tried my damnedest to not ask for help, but i had to ask taz too. makes me laugh when i imagine the day he must have on here, like a drill instructor walking through a field of shananagans:

“Code with two hands boy, this isn’t a rap concert. Private, why will your exploit not fire?..your magazine is upside down son! How did YOU end up on your own botnet?”

:lol: :smile: :lol: :love:

As a JROTC guy I find this especially funny

To round off the comedy, 15 years ago I was a basic training sergeant/instructor.

How did you go from that to infosec

@LMAY75 said:

How did you go from that to infosec

It was only a posting so after 2 years I returned to my trade.

Finally got root. This one was really hard to me but mostly because I’m not very good on the vector needed for privesc. BTW, if anyone knows about good resources to work on that, please DM me.

+1 respect to @TazWake and @c4ph00k for their help! Thx guys!

Really struggling with the exploit, have the creds already, but can’t do anything from there. Anybody can pm or give a little hint?

Type your comment> @LegendHacker said:

Really struggling with the exploit, have the creds already, but can’t do anything from there. Anybody can pm or give a little hint?

This box is marked HARD. The flow seems a bit easy/classic but it cannot work out of the box otherwsie the box would be easy. So you may be onto the right thing but he usual functions and checks you’d expect to use will not work. Find alternative functions or google for alternative functions to what you’d expect to work, but which doesn’t work.

Also, not showing any output doesn’t mean it didn’t work.

The flow is rather classic but the path is tortuous (at least it was for me). I needed hints, thanks @TazWake.
For those who found @sparkla’s script useful, check this one out https://github.com/mxrch/webwrap (a wee bit better).
My 2cents (everything has been said!):
Foothold: if you want to get a shell, bypassing the restrictions in place is googleable.
User1: one function will help you do what you need to do to get access. You can land directly here without the foothold above.
User2: enum.
Root: quite a common backdoor.

What is wrong with the box rn? It is not curling my links. Not even curl localhost

Nothing is wrong. It is supposed to be like that.

apart from re**r*ng any other way to do privesc ?

@niting3c said:

apart from re**r*ng any other way to do privesc ?

Not as far as I am aware.

Type your comment> @niting3c said:

apart from re**r*ng any other way to do privesc ?

Its rlly not that bad. Basically plug and play with ghidra, wouldnt even consider it reversing.

Third time the website “disappears” even though the box is pingable. Even resetting doesn’t fix the issue. What’s wrong ?

FInally I managed to get root.
Thanks for great machine @D4nch3n. I learned something new especially about php backdoors. Also searching for compromise leftovers was something new for me - guess I wouldn’t be a good sysadmin :wink:
Many thanks @TazWake and @LMAY75 for your great hints along the way.

Umm, Hey guys just started the box today found the backup and an exploit for “l*** c***” but it requires the user credentials. Can someone help or if i am going down a rabbit hole please alert me!!

Edit: I got the user name for " l*** c*** "