Official Love Discussion

ugh…feels like I should have got user earlier…comment by @anir08 set me on the right path…completely forgot about the configuration part. Also spend too much time on the ***i path but the link in that post got to where I could use what I knew. Make sure to take notes on all the machines you do…chances are you’ve already used this trick.

On to admin access…hit me up if you need a nudge.

Cheers

update: got system…lots of good hints in the forum…thanks! Fun box!

Hi. Not sure what I’m doing wrong. I have the user. I’m pretty sure I’ve found the way to privesc. My shell is very unstable and I cannot use the r###s /u###: command to execute anything. Any ideas what I’m doing wrong?

Edit: I have a stable shell and I am a part of the “in” group, but still can’t access the flag.

EDIT: Nevermind. Tried harder and got it.

@eMVee said:

can I DM you about this?

yes

I just got user but it doesn’t feel satisfying when I don’t have a full understanding of why it worked. If someone has a chance to DM me and explain why 3 out of 4 shells (all using the same language) didn’t work but the 4th one did it would be much appreciated. I almost gave up on that route because I thought it wasn’t viable.

Been struggling on getting a foothold for a couple of days now. I found the secret area that everyone has been talking about by observing my map. I found a thing, that just echos back what you throw at it. However I don’t know what to specifically throw at it to make it echo back what i want to know.

Honestly a DM in the right direction would be greatly appreciated!

Hi I don’t usually come over to the forums asking for help but I am completely stuck trying to find initial foothold I’ve found the service everyone is talking about via the nmap output I’ve tried enumerating the directories/files but most are forbidden. I also enumerated the ad**n directory using gob*r and I managed to read a file that showed a ver ID but I have nothing else and I’m completely stumped. If anybody has any good resources to read up on that will help me get through this blockage it would be much appreciated.

EDIT:
No worries I got some help from the discord I can’t believe that I was so close but forgot to use something from my n**p

I found the box very finicky, so if what you think you are doing should work for root and it’s not, try a reboot, as after wasting a bunch of time, what I was doing worked the very first time after rebooting.

heh, I hesitate to mention this because I don’t want to lead anyone down a gopher hole, but I got user by changing stored info because I completely missed the easier intended method.

Spent the whole night trying to get into it. Here are the hints

User: If you’re like me and looking into various services or injections, that’s not the way to go (or maybe it is an unintended way who knows). Scan thoroughly, go through the results with a fine comb, maybe even adjust the normal flags you’d use in your standard nmap scans.

Root: If you’re using our pride and join, metasploit, it’s pretty easy to do, you just gotta ELEVATE the privileges.

Fun box, loved it. If anyone is stuck please ping me, will reply in a few hours, have to go to sleep right now

Fun box.

User: Use all you have in scans.

Root: With metasploit is very easy to exploit, enumeration key, as always

For any nudges DM.

That was so nice after a long break from HTB! Easy and fun box, but it’s easy to get stuck on some rabbit holes. Feel free to send me a DM if you need a nudge

Nice box! Learned a few things and got a lot better at using different tools.

Foothold

Do not get stuck in the rabbit hole that I did on the web piece. Return to your nmap scan and keep things simple. Make a simple config tweak and observe the new avenue you have opened! From here, enumerate until you find a way in. Found a new piece of functionality that you do not know how to leverage? Maybe it can be used differently from how you're thinking about it.

User

Fairly simple once you find a way in. Basic reverse shell work.

System

Far easier than user. My difficulty was in achieving a stable shell and finding a good way to read the output of the tool I used. This tool is extremely commonplace for Windows privilege escalation; you will know what it is. Simply read the output carefully and Google for an article that demonstrates how to use the exploit; it is very straightforward and takes little time at all to execute.

Please feel free to DM me for hints!

The administrator is much easier than the user, even without any tools.

I got some hint on the user, and I’d like to know why? what’s in the scan tells you how to do what you should do on the initial foothold. Anyone to explain? (DM please to avoid any spoilers)

Rooted, I really enjoyed this Easy box.

For foothold, if you know of this type of vulnerability you may have an easier time; if not, it’s a good learning opportunity and an opportunity to test creativeness. Shout out to Pentesterlab.com for the assist :wink:

Rooted

I have a question, why i cant use mysql ? is there a sintax to check the db ? thanks if some one want help me.

@NFire0111111 said:

Rooted

I have a question, why i cant use mysql ? is there a sintax to check the db ? thanks if some one want help me.

It depends what you mean about using MySQL. Was it running on this box?

Hey i’m a bit stuck, can somebody PM me ?

Rooted!
Very cool machine to make but I had some problems on w…s… and I needed to restart the machine a few times.
user you need to enumerate and keep an eye on the return of the ports you find.
root there are several ways to get scaling. I found the user more difficult than root.

If anyone needs help can give me a nudge pv.


Enraizada!
Maquina muito legal de se fazer porém tive alguns problemas na w…s… e precisei reiniciar a maquina algumas vezes.
user é preciso enumerar e ficar de olho no retorno das portas encontras.
root existem diversas formas de conseguir escalar. Achei o usuário mais dificil que o root.

Caso alguém precise de ajuda pode me dar uma cutucada pv.

#RecifePoxa!

Rooted successfully, Easy box
Enumeration is a key.
DM for nudges

could someone give foothold?

got user and root. Strange machine lol :slight_smile: