@Z0d said:
(Quote)
I think you are headed for the wrong 'hash' since you are referring to a "user hash". By the way, I would recommend using the "Jumbo" (a.k.a community-driven) version of JTR for any conversion and cracking pro…
Thanks for the positive feedback -- glad you guys enjoyed this one. In case you want to read my write-up on it, then see the following PDF document (password protected with the HTB flag): https://github.com/artikrh/HackTheBox/blob/master/Obscure_For…
For PDF: I made a Python script which uses PyPDF2 library: https://github.com/artikrh/pdf-tool
Example usage:
$ python pdf-tool.py -d file.pdf -w /usr/share/wordlists/rockyou.txt
(Quote)
I think this is misleading a bit, it's rather a representation of specific character encoding scheme until the output makes sense after doing the obvious transformation, and taking into consideration the challenge name. "Missing bits&qu…
Since I am getting quite some PMs regarding this challenge, you can solve it in less than 2 minutes by using some very basic tools or cmd pipe combinations, and taking a quick skim through output -- you don't even need Wireshark.
I appreciate the work put into this box, and while the last vector of attack for (last) root was awesome, the path to reach that point was excessive in my opinion.
(Quote)
And we thought it was reddish-like. Nice box for privesc nevertheless
(Quote)
Sanitize it a bit (check the text for some characters that should not be there).
(Quote)
There was a previous box which had the exact same technique to get root. Ippsec made a nice and informative video about that, I suggest you take a look.