Official Jewel Discussion

I give up. The bugs have made this box unsolvable.

Rooted! Feel free to DM for tips or hints. Actually a fun box in hindsight.

Finally rooted, great box. For foothold, look at the name for ideas - what you need is rather recent. If your payload doesn’t work, play around with other potential payloads. For root, just ensure running the command “date” on your local machine, and on the box match.

Rooted. Box was all buggy yesterday, today was a bit better. Root was straightforward, user was a lot more difficult. PM me for nudges, happy to help!

Type your comment> @sparkla said:

Type your comment> @pizzapower said:

Type your comment> @sparkla said:

@pizzapower wearing all black?

Yes. I’m at my own funeral, lol. Still can’t get my payload to work, and I’ve been too busy this weekend to work on it much

I know the feeling :smiley:

Just got home from working all weekend and rooted within a couple of hours. I spent 95% of my time trying to figure out what I had wrong in getting foothold. Seems to be par for the course for me.

Spoiler Removed

Found the problem, my local time was not in sync with the server. Please sync the Jewel box with ntp to prevent this **** or is it intended?

Got user.
To be honest, I’ve never, ever, dealt with R*** at that level, so I was doing my field study while at it. But I probably spent 8 to 10 straight hours searching anything that would get me the foothold. Any exploits, CVEs, patches, versions, anything. Then I searched on a random place after hope was lost and I finally found it.

Even then, the payload was a bit confusing, I had to use a few online tools to write it properly and to mess with it around. The tool everyone uses was returning me a perfect message with my payload, where it shouldn’t.

For root, after many tries (and hours) on making things equal, I gave up on anything by the books and I went the ugly, manual way. It worked instantly.

Great box. I’ve learnt so much from it.

Rooted! Took me far too long to find the initial vulnerability as I was looking in the wrong places. The vuln is much more recent and didn’t turn up in initial searches!

For root enumerate and go back and do something you may have tried at the start. They aren’t the same… from there its straight sailing.

Also for the foothold, the way I found it was using a website that scans a certain file that is exclusive to the language involved in the blog. It parses the file and looks for vulns.

I found it like 5 minutes after the box was live. I was sure I was going to get blood, and then I had to go to work, and then I couldn’t get my payload to work properly, and then I drank too much.

I thought this was my one chance for HTB glory, because even easy boxes take me like 5 hours, usually, but alas, it was not in the cards, lololol.

Type your comment> @pizzapower said:

I was sure I was going to get blood… and then I drank too much.

that’s me every Saturday

Type your comment> @sm4sh0ps said:

Type your comment> @pizzapower said:

I was sure I was going to get blood… and then I drank too much.

that’s me every Saturday

At 2 in the afternoon? :lol:

Amazing box!!!

Learned some tricks. I would think this box is not medium but ok. Thx for this kind of boxes

my hints:

User: try to find the code and google somethings. I’m not expert on this programming language so it takes me a lot of time. There is a CVE on github and other article on hackerone. Read them (remember don’t need clone nothing)

Root: Basic enumeration will give you some key words. Keep in mind that home have a clue about escalation.

Very greatfull

Type your comment> @LMAY75 said:

Type your comment> @sm4sh0ps said:

Type your comment> @pizzapower said:

I was sure I was going to get blood… and then I drank too much.

that’s me every Saturday

At 2 in the afternoon? :lol:

lol, I have a strange work schedule, so I have to fit the drinking in whenever I can

Just rooted this. Pm for a nudge but make sure you can tell me what you’ve tried first.

Hi can someone give me hint on initial foothold part, i am working with r**** exploit and i found rce script on github, but when i tried it, it doesn’t work. I tried to do what the script do manually, but it doesn’t work too. Any hint with foothold?

Finally rooted this box. Last part with “synchronization” almost killed me :smile: I tried to synchronize over and over again, but still nothing. After all attempts I went the other way and succeed at the end

This ones driving me potty. Even with the tips here I’m getting nowhere :{

Completely reinstalled Kali because my VM was filled with so much clutter and filler, going to get back to this machine tomorrow, hopefully I’ll make some progress :slight_smile:

Type your comment> @0xstain said:

Hi can someone give me hint on initial foothold part, i am working with r**** exploit and i found rce script on github, but when i tried it, it doesn’t work. I tried to do what the script do manually, but it doesn’t work too. Any hint with foothold?

This tricked me for a bit too, first make sure you have the correct version of ruby, and then there’s a typo in the readme’s r**** commands on github so pay close attention.