Official Love Discussion

This is a fun box.

It’s nice to see a box where good, basic, steps work and it rewards following a pentest methodology.

Big thank you to @pwnmeow for putting it together.

Need help priv escing to root. I got initial foothold and got the user flag (I didnt priv esc to user). This is my first time privescing on a windows machines and I am lost in the sauce.

@AstheticPotato said:

Need help priv escing to root. I got initial foothold and got the user flag (I didnt priv esc to user). This is my first time privescing on a windows machines and I am lost in the sauce.

Its hard to give a hint here. If you are in the user account, the privesc is fairly simple - and can be found with some common enumeration (registry keys are always interesting).

If you aren’t in that account, you might still be able to do it - but I am curious how you got a shell in a different account. (Or do you mean you used the webservice to read the user flag rather than get “on the box” ?)

I got it, welcome PM me

meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM

Type your comment

Can any one explain why winPEAS.exe not working on this machine?

Thanks

Type your comment> @VSOP said:

Can any one explain why winPEAS.exe not working on this machine?

Thanks

It worked for me. What happens when you try to execute it?

it ran few line and show All Microsoft Updates and kicked my out of machinel when i execute it

@VSOP said:

it ran few line and show All Microsoft Updates and kicked my out of machinel when i execute it

Are you sure that it’s not just that your shell is unstable? I used the “non-obfuscated any” version of winpeas, if that is any help.

Type your comment> @Jac0lius said:

@VSOP said:

it ran few line and show All Microsoft Updates and kicked my out of machinel when i execute it

Are you sure that it’s not just that your shell is unstable? I used the “non-obfuscated any” version of winpeas, if that is any help.

Yeah. i tried same version with you and also tried winPEAS.bat too but same issue. i used php reverse shell from Ivan Šincek. i dont know what happening

@VSOP said:

Type your comment> @Jac0lius said:

@VSOP said:

it ran few line and show All Microsoft Updates and kicked my out of machinel when i execute it

Are you sure that it’s not just that your shell is unstable? I used the “non-obfuscated any” version of winpeas, if that is any help.

Yeah. i tried same version with you and also tried winPEAS.bat too but same issue. i used php reverse shell from Ivan Šincek. i dont know what happening

I just tested again and the shell I am using is the “mini” version from the same guy. Everything worked as should.

Getting stuck on the rev upload… When clicking update the site doesn’t respond, it just keeps loading until eventually a request time out occurs. I’ve reset the box and same problem. Any others experiencing this?

Bit tricky one, had to look into the forums and notice other players do one special thing in a subdir, to see why my ev**-***m didn’t allow me to do the privesc. Actually I still don’t understand why it’s like that, happy for explanation.

Type your comment> @netbanger said:

Getting stuck on the rev upload… When clicking update the site doesn’t respond, it just keeps loading until eventually a request time out occurs. I’ve reset the box and same problem. Any others experiencing this?

had 2 vpn instances running instead of 1. Worked immediately after I disconnected from the vpn that isn’t needed ■■■■

Okay, it just happened, I made a decision to ask some help on this box… I got the user flag as user… Now I need to do some privilege escalation. Windows boxes are not my thing (yet). That’s why I want to do this one.

While reading the posts in this thread, I get the idea I took a different path. So let me explain a bit.

I’ve performed a port scan and with those details I’ve decided to check the source code of the logon page. While using my Google-Fu skills I’ve found an S–I bypass which give me access as a-----n on the a-----n-page. Because it’s a Windows box using a particular development language I was thinking about uploading a rev— s—l and a n-.–e because of a known b—ss up---- exploit in this tool. Via this way I got the user P----e and the user flag. While enumerating the directories and files I’ve found the username and password for the user on the a-----n-page, but I don’t need them because of my earlier step… And another one for P----e… but not sure if I can reuse this one and if I need this on as I am this user.

Uploading winpeas.exe and winpeas.bat are working for me, but running them not… that part didn’t give me any clue… So i decided to see if anyone had the same issues. While reading the posts before me I started thinking that I got another user account then others… especially because I saw something about checking privileges, policies and a certain hint about “Windows I*******r is not correctly installed.”…

So I am thinking I walked another path and I am stuck… Can anyone help me back on track again…

Type your comment> @eMVee said:

Okay, it just happened, I made a decision to ask some help on this box… I got the user flag as user… Now I need to do some privilege escalation. Windows boxes are not my thing (yet). That’s why I want to do this one.

Manual enumeration works well here. If you look at the hacktricks website, the steps you need are in there.

Once you find the exploitable setting, the hints might make more sense to you. Then it’s a fairly easy exploit.

Type your comment> @TazWake said:

Type your comment> @eMVee said:

Okay, it just happened, I made a decision to ask some help on this box… I got the user flag as user… Now I need to do some privilege escalation. Windows boxes are not my thing (yet). That’s why I want to do this one.

Manual enumeration works well here. If you look at the hacktricks website, the steps you need are in there.

Once you find the exploitable setting, the hints might make more sense to you. Then it’s a fairly easy exploit.

Okay, i’ve the root flag… but I used a framework which automate a lot of things and that’s nice. However I want to do it manual as well… One of the options manual I tried, but is didn’t work. Probably my windows skills which sucks… can I DM you about this?

ugh…feels like I should have got user earlier…comment by @anir08 set me on the right path…completely forgot about the configuration part. Also spend too much time on the ***i path but the link in that post got to where I could use what I knew. Make sure to take notes on all the machines you do…chances are you’ve already used this trick.

On to admin access…hit me up if you need a nudge.

Cheers

update: got system…lots of good hints in the forum…thanks! Fun box!

Hi. Not sure what I’m doing wrong. I have the user. I’m pretty sure I’ve found the way to privesc. My shell is very unstable and I cannot use the r###s /u###: command to execute anything. Any ideas what I’m doing wrong?

Edit: I have a stable shell and I am a part of the “in” group, but still can’t access the flag.

EDIT: Nevermind. Tried harder and got it.

@eMVee said:

can I DM you about this?

yes