Found the vulnerability and POC without any assistance, but couldn’t get it to work properly with any custom commands. Took a lot of time spinning my wheels after that, but got it working. Root was easy. Decent box, albeit far from my favorite.
So going through a file I found two password hashes. With the type of hashing used, it’s going to take over a week to crack one using john. Is this a rabbit hole?
So going through a file I found two password hashes. With the type of hashing used, it’s going to take over a week to crack one using john. Is this a rabbit hole?
It depends. It shouldn’t take that long if you have the right file. The hashing mode (starts with a b) is quick to crack in Hashcat.
So going through a file I found two password hashes. With the type of hashing used, it’s going to take over a week to crack one using john. Is this a rabbit hole?
It depends. It shouldn’t take that long if you have the right file. The hashing mode (starts with a b) is quick to crack in Hashcat.
System doesn’t let me log in to website. I made a payload but I can’t use. Because I can’t log in [If you are the application owner check the logs for more information.] Any hints?
System doesn’t let me log in to website. I made a payload but I can’t use. Because I can’t log in [If you are the application owner check the logs for more information.] Any hints?
When you say you “cant log in”, what error messages are you getting? Are you sure you are using the correct account details?
can i please get a nudge? im stuck on that box for a couple of hours now and im so frustrated have’nt gotten the user yet but done so much recon
This is one of the harder medium boxes, so be prepared to do some “out-of-the-box” thinking.
First make sure your wordlist is big enough. Then enumerate the servers. One on you might find something which is worth further investigation. If you find a software version, look to see if it is exploitable. If it is, exploit it.
can i get a nudge on cracking the hashes? I found more than 2, having trouble getting the right dictionary for this. I am running hashcat and ran jtr both with the B* algorithm but it doesnt seem to be able to crack. I found the search engine but i believe i need to crack these hashes before i priv esc so i can use the password to run s***
Got root! Very nice machine! Learned so much about new things!
Foothold is hard when it’s compared to privilege escalation. Timing created a huge problem for me to do 2 F* thing. But I used a mobile app, then it’s finally done.
Are user (b***) password crackable? I’m like 1h in rockyou and can’t can’t manage to crack it and I’m quite stuck on that
EDIT:
It is but right hash need to be bruteforced
Are user (b***) password crackable? I’m like 1h in rockyou and can’t can’t manage to crack it and I’m quite stuck on that
EDIT:
It is but right hash need to be bruteforced
are there any hints on the machine that clued you into any patterns for the mask? like b*** likes special characters, password length X, etc ?
Are user (b***) password crackable? I’m like 1h in rockyou and can’t can’t manage to crack it and I’m quite stuck on that
EDIT:
It is but right hash need to be bruteforced
are there any hints on the machine that clued you into any patterns for the mask? like b*** likes special characters, password length X, etc ?
@unkn0wnsyst3m b*** is a user, I wasn’t sure if this was a spoiler or not so I mask it, but if you are struggling with cracking user password you are probably looking at wrong hash of this user. Right hash are cracked in seconds with john and rockyou. I missed it at first but then I ran linpeas and after that I was able to use right hash
(Quote) @ghostng b*** is a user, I wasn’t sure if this was a spoiler or not so I mask it, but if you are struggling with cracking user password you are probably looking at wrong hash of this user. Right hash are cracked in seconds with john and rockyou. I missed it at first but then I ran linpeas and after that I was able to use right hash
Ok thanks for the feedback. I have 3 hashes and already found the one from linpeas, hmmm I’ll look at my John commands again.