Official Academy Discussion

Foothold was obvious enough for me to miss it for way too long :smiley:
For user1 to user2, when I landed in the home directory, I saw a .viminfo file, and the thing everyone’s looking for was in it. Thankfully for me, for some reason it didn’t work so I kept working and finally got it the regular way.
But, for everyone, please, please, clean up the place before leaving, it can really ruin the fun for the others !
Anyway, good box, even though the user switch drove me insane :slight_smile:

Type your comment> @bashsupremacy said:

Type your comment> @saulgoodmn said:

Type your comment> @saulgoodmn said:

Anyone do the user part manually?

Anyone get user manually instead of using msf*******? please PM me if you did. Just IMHO, I would say this is not OSCP like. I rooted and did a personal write up on every box in the public network during my lab time. The OSCP boxes are more like “find the exploit” enumerate, create your payload , find root vector own box. I only seen this method in the training .pdf in the 2020 version.

I would also like to join the discussion about manually doing it after having done it with msf… I found some stuff on github but I can’t seem to get it to work.

Thank you for your interest. I still can’t find a way to do this manually except for removing the MSF needed part of the exploit and making it work manually. You can only use MSF once on the OSCP test. That is one of the hardest tests I have ever done. Learn how to do all of these manually if your goal is to be a professional pentester. Sometimes all you get is a cmd line with limited to no tools in a real world pentest. Learn MSF but don’t depend on it.

Hi crew, I found user2 password but not really sure that is the right user that I need to get root. Also tried password variations for userX and grep for all other similar “values”.
Any tips where to go from here? :slight_smile: TNX.

@AHam1lt0n , @bashsupremacy
I sent you a PM. There are several publicly available scripts that work without MSF :wink:

@MadTriber said:

Hi crew, I found user2 password but not really sure that is the right user that I need to get root.

The easiest way to find out is to become the user and see what they can do.

Also tried password variations for userX and grep for all other similar “values”.
Any tips where to go from here? :slight_smile: TNX.

It depends why you think user2 is no use for you and what you are looking for with userX for example.

I am stuck with users part
any hints

@khanafeer said:

I am stuck with users part
any hints

If you have a shell, enumeration is key.

rooted! nice box!
took some time to switch from user2 to user3, I was chasing the wrong user =/
thanks @TazWake.

TNX @TazWake for pushing me in the right direction. Getting a root is really simple when you have user2.

Intercept every request your browser send and look at them. It is a good practice to do this everytime, so you can have a look at how the web app works. After this you should give some attention on the framework used and then use that to get inside the box. After that think how the web apps store the creds to access different services internally. Then look at where you belong, and which permissions you have. Use those permissions to find userfull info. And at the end it’s simple, and in front of you. I hope this isn’t spoil at all. If you need further help send me here or on discord, but first tell me what did you do.

some one can help me root the machine?
i already have user
PM PLEASEE

@shahafkobi said:

some one can help me root the machine?
i already have user
PM PLEASEE

You need another user, then the path to root presents itself to basic enum.

So, I found the secret a**** area. Found the MSF l****** exploit and set VHOST to dev--**-..*** . After running the exploit, the output in Burp is a 500 UnexpectedValueException . Can anyone point me in the right direction?

@el0uid said:

So, I found the secret a**** area. Found the MSF l****** exploit and set VHOST to dev--**-..*** . After running the exploit, the output in Burp is a 500 UnexpectedValueException . Can anyone point me in the right direction?

Are you pushing the attack through burp rather than at the server directly via MSF?

If you are using MSF, dont forget the key matters.

Type your comment> @TazWake said:

@el0uid said:

So, I found the secret a**** area. Found the MSF l****** exploit and set VHOST to dev--**-..*** . After running the exploit, the output in Burp is a 500 UnexpectedValueException . Can anyone point me in the right direction?

Are you pushing the attack through burp rather than at the server directly via MSF?

If you are using MSF, dont forget the key matters.

Okay, I’m dumb LOL … I found the key.

so i think i’m really stupid here. I got a shell and spent so much time almost 3 days trying to get a user flag using enumeration that everyone is talking about but really couldn’t! i used linux enumeration script l*np**s.sh and it got me so many files and i almost looked into all of them with nothing! I know i’m a beginner so i think i’m missing a something fundamental here?

i found so many passwords that are default ones and tried them all on the box and mysql and ssh but no luck. something is definitely wrong with me.

if anybody is willing to help i would appreciate it.

I really need a push with user1 and user2. I am clueless.
Nudge plz.

@nnahnnoud said:

so i think i’m really stupid here. I got a shell and spent so much time almost 3 days trying to get a user flag using enumeration that everyone is talking about but really couldn’t! i used linux enumeration script l*np**s.sh and it got me so many files and i almost looked into all of them with nothing! I know i’m a beginner so i think i’m missing a something fundamental here?

i found so many passwords that are default ones and tried them all on the box and mysql and ssh but no luck. something is definitely wrong with me.

if anybody is willing to help i would appreciate it.

Most scripts wont find it because it isn’t in human-readable form. In Linux lots of things get logged by auditing tools. If you can find something which captured someone else doing what you want to do, this might be useful.

@cypher0x1 said:

I really need a push with user1 and user2. I am clueless.
Nudge plz.

In Linux lots of things get logged by auditing tools. If you can find something which captured someone else doing what you want to do, this might be useful.

Just finished the machine, it was very nice and learned a lot!

If you need some nudges write me!