Official Compromised Discussion

Type your comment> @TazWake said:

@LMAY75 said:

Type your comment> @TazWake said:

@b3nd0 said:

@LMAY75 Yea I tried my damnedest to not ask for help, but i had to ask taz too. makes me laugh when i imagine the day he must have on here, like a drill instructor walking through a field of shananagans:

“Code with two hands boy, this isn’t a rap concert. Private, why will your exploit not fire?..your magazine is upside down son! How did YOU end up on your own botnet?”

:lol: :smile: :lol: :love:

As a JROTC guy I find this especially funny

To round off the comedy, 15 years ago I was a basic training sergeant/instructor.

How did you go from that to infosec

@LMAY75 said:

How did you go from that to infosec

It was only a posting so after 2 years I returned to my trade.

Finally got root. This one was really hard to me but mostly because I’m not very good on the vector needed for privesc. BTW, if anyone knows about good resources to work on that, please DM me.

+1 respect to @TazWake and @c4ph00k for their help! Thx guys!

Really struggling with the exploit, have the creds already, but can’t do anything from there. Anybody can pm or give a little hint?

Type your comment> @LegendHacker said:

Really struggling with the exploit, have the creds already, but can’t do anything from there. Anybody can pm or give a little hint?

This box is marked HARD. The flow seems a bit easy/classic but it cannot work out of the box otherwsie the box would be easy. So you may be onto the right thing but he usual functions and checks you’d expect to use will not work. Find alternative functions or google for alternative functions to what you’d expect to work, but which doesn’t work.

Also, not showing any output doesn’t mean it didn’t work.

The flow is rather classic but the path is tortuous (at least it was for me). I needed hints, thanks @TazWake.
For those who found @sparkla’s script useful, check this one out https://github.com/mxrch/webwrap (a wee bit better).
My 2cents (everything has been said!):
Foothold: if you want to get a shell, bypassing the restrictions in place is googleable.
User1: one function will help you do what you need to do to get access. You can land directly here without the foothold above.
User2: enum.
Root: quite a common backdoor.

What is wrong with the box rn? It is not curling my links. Not even curl localhost

Nothing is wrong. It is supposed to be like that.

apart from re**r*ng any other way to do privesc ?

@niting3c said:

apart from re**r*ng any other way to do privesc ?

Not as far as I am aware.

Type your comment> @niting3c said:

apart from re**r*ng any other way to do privesc ?

Its rlly not that bad. Basically plug and play with ghidra, wouldnt even consider it reversing.

Third time the website “disappears” even though the box is pingable. Even resetting doesn’t fix the issue. What’s wrong ?

FInally I managed to get root.
Thanks for great machine @D4nch3n. I learned something new especially about php backdoors. Also searching for compromise leftovers was something new for me - guess I wouldn’t be a good sysadmin :wink:
Many thanks @TazWake and @LMAY75 for your great hints along the way.

Umm, Hey guys just started the box today found the backup and an exploit for “l*** c***” but it requires the user credentials. Can someone help or if i am going down a rabbit hole please alert me!!

Edit: I got the user name for " l*** c*** "

Type your comment> @shubhanshu7 said:

Umm, Hey guys just started the box today found the backup and an exploit for “l*** c***” but it requires the user credentials. Can someone help or if i am going down a rabbit hole please alert me!!

You are on the right track , enumerate through the backup… as other comments have mentioned it is very worthwhile learning grep,find,locate to help with your searching. Another helpful comment was pay attention to dates :slight_smile:

Rooted. If you need some help, DM me.

User:Find correct vuln web to upload webshell and search some creds with webshell.
Root: think like a “heartbleed” It’s not about the heartbleed. Only exploitation type is similar.

Finally rooted after a few very long days! Thank you @gunroot and @LMAY75 for the nudges. Some of the tips one here are exactly what you need! Enumeration is a big part to the box. Information for user1 can be found in multiple places… once of which you have probably used already :wink:

Happy to help nudge if you need help, provide what you have done and where you are up to in a PM.

Really interesting box.
I learnt something trying to get a webshell, but its entirely not necessary (and its probably easier not to get a webshell).

I found it usefull to rewrite what was changed and print it, as i had all the letters right but not the order.

I can read files list directories but I am coming empty. I see couple of users that have bash in passwd but I am not finding info to compermise those users. Any hints would be appriciated

Real fun box, I got stuck at root, thanks to @LMAY75 for the nudge.
On a hindsight, it was obvious.

I loved scripting to own this box, this is my take on the “Not A Reverse Shell”, nothing new but since nobody posted something similar (having history, history search and emacs style special keys).

#!/usr/bin/env python3
import cmd


def execute(line):
    import requests
    target="http://YOURRCE"
    r = requests.get(target, params={"YOURCMDARG":line})
    if r.status_code == 200:
        return r.text
    else:
        return f"{r.text}\r\nnars> ERROR: http response code was {r.status_code}"

class NotAReverseShell(cmd.Cmd):
    prompt="nars> "

    def do_help(self, line):
        print("Not A Reverse Shell, a pseudo shell when you cannot have one.")

    def default(self, line):
        print(execute(line))

    def do_EOF(self, line):
        print()
        return True

    def do_exit(self, line):
        return True

    def do_quit(self, line):
        return True

if __name__ == "__main__":
    NotAReverseShell().cmdloop()

Beautiful box!