Official Time Discussion

Nice box. The hardest part is finding the right CVE after that its pretty straight forward.

Rooted!

Finally! It was super interesting on the user part. Big thanks to @zaphoxx for the hint on user. Since I’m so noob I actually had difficulty with root but finally found it.

User : it’s all about the right CVE
Root : there are alternatives to cron

Happy hacking :wink:

Hello.

Been searching for this CVE based of my enumeration and the comments on this thread. I’m having trouble. Could someone give nudge towards the correct CVE?

Thanks!

Edit: Got it.

Hello. Bit stuck on this one. I found the vulnerability but am having problems exploiting it. I think i have to compile my own java and then paste it in, but im having problems compiling something with javac. Getting errors like
Exploit.java:4: error: package com.sun.org.apache.xalan.internal.xsltc.runtime is not visible
Not sure I am even on the right track!

Im using javac 15.0.1

pwned box :smile: …easy box

user: CVE

root: basic enumeration

PM if you need help.

Need help for User not sure about using the vulnerability can anyone help?

Rooted!!
Thanks @HiddenCry for helping me finding that correct POC for user part.
Finding the correct version of CVE and the exact POC is little difficult, rest is very easy.
Hint:
User: look for the newest CVE.
Root: Trust me, it’s very easy.
PM for Nudges.

In addition to the hints already given, i would say that the key of getting user is find the right article that explain how to use the exploit… you don’t have to create nothing from scratch.

ok, i got user, was easier than i expected, but getting root… not quite there yet. bit of a noob here. I could use a pointer to keep me from going down another rabbit hole.

Hello there. Got user but having trouble with my method for root. Can anyone help?

i m beginner!
anyon here to help me ???

Type your comment> @Termopan said:

Rooted! Easy box, indeed.
User: It’s so 2019
Root: it repeats itself, so just listen and change

Understand the User part hint until find the right exp by searhing many websites and benefit by your hint at root part, thanks a lot.

User was a pain in the ■■■. Really easy, however you need to try many different ways of the similar thing…
Root was really easy and fast to get.
If someone needs a nudge, PM me :slight_smile:

when i am submit flag then its shown incorrect flag why

@johnwickelson said:

when i am submit flag then its shown incorrect flag why

This comes up on every thread about once a week. HTB uses dynamic hashes and sometimes they dont work. The hashes should change after every reset and be different on different VPNs - this means that hashes should be used as soon as you get them and that sometimes the process which registers the new hash in the scoring server will break.

If it is a box that is being hit with resets, it becomes imperative that the hash is used immediately as a reset will render it invalid.

Your choices are really:

  • Wait a while, repwn the the box and get a working a hash.
  • Report it to HTB via a jira ticket and get them to fix the problem.

This isn’t something that can be fixed by the forum or by tips from other users.

Hi, i found the error on the page and did some lookup which leads to CVE details. Then i got stuck. Can someone help? Not sure what can i do from the CVE on-wards. Thanks in advance.

Interesting box - I finally got round to doing it. User was harder than root.

User - experimentation and googling the outcomes is effective.

Root - good enum matters. I was a bit sloppy and it took me twice as long as it should have.

ok so, I got the user flag and found the bash script i am supposed to run, when I run the script i connect to the machine as root but after 2-3 seconds get disconnected… I dont know what’s causing this…can anyone help? Thanks in advance

@EX1TZER0 said:

ok so, I got the user flag and found the bash script i am supposed to run, when I run the script i connect to the machine as root but after 2-3 seconds get disconnected… I dont know what’s causing this…can anyone help? Thanks in advance

Its like that whatever you are doing to get a shell is only running as long as the script runs - so when it exits, so does the shell.

You might want to get it to do something which gives more stable access to a secure shell.

Type your comment> @Chobin73 said:

Type your comment> @toddbrecher said:

Anybody having issues with their root shell not persisting very long? I’ve managed to pop the root shell, but it seems to expire after ~5 seconds.
pm

Having this same issue, any tips?