NIbbles

@reubadoob said:

@takuma said:

@reubadoob said:
yep, the right one in there. keep finding :slight_smile:

Thanks @takuma Got the exploit and payload together now just getting the following error:

[!] This exploit may require manual cleanup of ‘image.php’ on the target

Tried a reset. No change. Not getting a shell.

Do some research. It is indicating to you something really important that is not settled :smiley:

@Vex20k said:
I’m still having problems getting the root flag. I’ve tried numerous commands, but I’m probably doing something wrong. It either times out or some other reason.

Like many have suggested, enumeration of the box is really really handy in this case. There is a magic sentence somewhere in there:D

hello all, i have been able to decode the password but still can login. # I am 100% sure of the password. any tips

Hi Guys,

Can you give me hints to login to this machine?

I’m trying to get the root, I ran the bash script but I’m having the following error:
/bin/bash monitor.sh -i nibbler
TERM environment variable not set.
su: must be run from a terminal
Installation failed

@delusionmoon said:
are cronjobs relevant for priv esc in this machine?

well… personally I r00ted w/o them…

Need some help with Priv Esc. Have located the file that does not need passwd for root, have gone through artcles on sudo abuse. every time I run the script I get promted for a password. Have gone through all the comments and still not able to figure out the execution method. Could someone nudge me a bit further? happy to PM if any one’s around

Never Mind… Just rooted it. Found the issue. As mentioned before it’s all in the details. All I can say is that not all programs are in their proper location. hope it’s not too spoilery

Struggling a little bit to find the initial credentials. Would appreciate a PM if someone has an opportunity to help confirm I am on the right track.

FInally the joy of logging into the admin page! Got user.txt! Now onto priv esc!

tried combinations of default admin credentials as well as variations of Nibbles nibbles nibble etc etc - I know everyone kicks themself with the credentials but I tried all the obvious ■■■■

I swear I used those credentials :confused:

Spoiler Removed - Arrexel

Stuck with priv esc. I know the user files have a lot to do, but I can’t find a way how to exploit that. Any nudge, help, hint via PM would be really appreciated. I’m ready to facepalm myself already!

Actually the hard part was the admin login, because we have to positions as an owner of this system without any security mindset.

After get the access, try to enumerate what ever you can like a hacker.

All the information are useful.

Rooted!

Rooted, too - and I over-thought privilege escalation. Learned a lot about upgrading dumb shells to full terminals which i did not need in the end. I think I discarded the simpler way of doing things because I took an irrelevant timeout error too seriously and was too impatient … and then went on to search more complicated solutions.

I’m new to htb and trying nibbles for hours, please give me a hint . PM me

can someone PM plz. need a help with that privileged file!!

G0t r00ted!