Official Breadcrumbs Discussion

After spend a far bit of time on this box it’s clearly going to require more skills then i currently have. For all you that have finished it and have OSCP cert would you say this the kind of box that one should expect to find on that exam?

Hey,
I’ve been working on root but I’m currently stuck.

I’ve seen what’s inside K, and have been trying to read the content of that one table through several means but no luck so far. Is it what I’m supposed to do or am I missing something?

Thanks!

Is RCE on some web site intended way? Got low. priv shell with that

Type your comment> @mach1ne said:

Is RCE on some web site intended way? Got low. priv shell with that

I went this was as well. Now I know there may have been a shorter way with better enumeration, but I have learned some interesting stuff this way too.

I have learned to count from 1 to 4 and was able to find an interesting key, which doesn’t seem to fit in any hole… i would be glad for a nudge.

Edit: rooted

well, despite my faltering start, I’ve completed the box!

The very last step was a bit of a guess inspired by an old Stack Overflow thread, and a helpful error messages from the chef. I found this box to be a very worthwhile to persevere with as there so many facets to it - good stuff, @helich0pper !

Thanks again to @camk for picking me up after I fell at the first hurdle.

Can someone help me a bit in DM, please? I’m trying to get root, I’ve found an encryption key and something to decrypt with it, which gets me something what looks almost like a password, but has some binary content at the end, so I can’t decode it as a text. Am I on the right path, or totally off maybe?

Type your comment> @RummyExpress said:

Can someone help me a bit in DM, please? I’m trying to get root, I’ve found an encryption key and something to decrypt with it, which gets me something what looks almost like a password, but has some binary content at the end, so I can’t decode it as a text. Am I on the right path, or totally off maybe?

Try different modes

Type your comment> @hackpadawan123 said:

Type your comment> @RummyExpress said:

Can someone help me a bit in DM, please? I’m trying to get root, I’ve found an encryption key and something to decrypt with it, which gets me something what looks almost like a password, but has some binary content at the end, so I can’t decode it as a text. Am I on the right path, or totally off maybe?

Try different modes

I’ve been trying, and there is only one which does not fail at all, and there is a readable output, but the last couple bytes can’t be decoded as ASCII

Type your comment> @RummyExpress said:

Type your comment> @hackpadawan123 said:

(Quote)
I’ve been trying, and there is only one which does not fail at all, and there is a readable output, but the last couple bytes can’t be decoded as ASCII

I have sent you a dm to not spoil anything here.

I haven’t seen many boxes with the variety of different challenges this one has. The breadcrumbs really help keep on target, but it’s still a great workout.

The last step is a doozy though. If you got something that looks right but doesn’t work, you’re very close. Try modes that require information that you don’t have, then guess till it works.

Completed, definitly one of the funniest box.
If you need help you can send a DM.

Thank to @hb86125295 for helping me.

I was able to find usernames via enumeration processes, but have been unable to move forward as it seems I am hitting rabbit holes. Could someone DM me with a hint based on where I am at please.

Type your comment> @MactheDice said:

I was able to find usernames via enumeration processes, but have been unable to move forward as it seems I am hitting rabbit holes. Could someone DM me with a hint based on where I am at please.

Try intercept and examine requests, maybe there’s something unusual?

This is a great machine to bridge the gap between Medium and Hard from my perspective as a recently-minted OSCP. Excellent work by @helich0pper. Nothing too complex, but requires a lot of attention to detail and more intermediary steps. There is a clear logical progression while fitting multiple pieces together. Here’s a few hints (never done one of these posts, so please let me know if I gave too much away anywhere):

Foothold: Poke around the application, mess with some values in your proxy and see if you can induce unexpected behavior. Once you find a problem, it’s a good idea to write a script to make it easily repeatable. Be careful not to gloss over details. Again, writing a script can make testing easier when you’re working on getting the way in to work.

Lateral Movement: There’s another open port that can help once you’ve found what you need.

Privilege Escalation: There’s a useful file related to the user’s notes that you can find on the system by following standard enumeration procedures. The information there will put you on the right path. You can get what you need for the last step via the command line or by revisiting an earlier step. This can be very simple and direct - the other hints have described some very roundabout methods for this part. Keep it simple.

Fun box indeed - took my time with this one which was worth it.

Big kudos to @camk for your assistance on this.

And a big thank you to @helich0pper for creating this awesome challenge

hi all, i am struggeling with the last step in getting the admin pw right. could someone assist ? I do have all I need I think but the modes I tried didnt work out properly.

update: thanks to everybody who replied. got it now!

very nice work @helich0pper . enjoyed this box a lot. the only thing I didnt like too much was the final step where I got stuck at. thanks @xploiter121 for helping me out when I lost my path on the way to root.

Type your comment> @h0l1st1c4l said:

hi all, i am struggeling with the last step in getting the admin pw right. could someone assist ? I do have all I need I think but the modes I tried didnt work out properly.

For some modes you may need some info you don’t have. Maybe it works without it as well. If you need more detailed help, let me know via dm

Are there HTB{} flags in this box?

@thecog said:

Are there HTB{} flags in this box?

I haven’t done this box, but probably not.

Machine flags tend to be in a file called user.txt or root.txt.