h0l1st1c4l

About

Username
h0l1st1c4l
Joined
Visits
827
Last Active
Roles
Member

Comments

  • hi all, is someone else having this problem. I have foothold on the machine but even though the privileges allow to read files e.g. rwxr-xr-x root:root <somefile> I am not able to cat some of them. this happens especially with "larger&quo…
  • hmm, I got a hash, do I need to crack it. seems to take ages with the feline tool. any hints ?
  • Type your comment> @nekothedj said: (Quote) send you a dm
  • Type your comment> @Bl0w13 said: (Quote) DM me. Was stuck in the same boat
  • hi all, i am struggeling with the last step in getting the admin pw right. could someone assist ? I do have all I need I think but the modes I tried didnt work out properly. update: thanks to everybody who replied. got it now! very nice work @heli…
  • Type your comment> @UVision said: > Type your comment> @h0l1st1c4l said: > > (Quote) > Unfortunately yes, I fell into this trap, but I don't consider it as "cheating", because the article explains how the privesc wor…
  • finally rooted! great box. took me some time for user due to the unusual OS but the green vegetable did help. path to root was new to me. probably easy to someone who is familiar with this functionalities. unfortunately it looks like someone already…
  • foothold and user were relatively straightforwarded. but now i am stuck on root. I think i got the right path but would like to check with someone if I am on the right track as I couldnt get a shell back yet with the exploit I am trying to use. pls …
  • nice and easy box. I think this is a good beginner machine. user did go down very quickly so I got myself cocky and karma slapped me in the face for that. so for root1 lesson learned: if the witch cant find the snake, dont assume it is not there, i…
  • Hi, I am stuck which I think is the final step to root. Having problems with the feline tool to do my bidding. Anyone dare help me out ? Please DM me. Thx
  • Finally root. Thanks to @TazWake who pushed me in the right direction at user and @HomeSen for showing that sometimes the trivial stuff is the solution to go for. One of the best machines I have done so far. User was very instructive and root was re…
  • Type your comment> @TazWake said: (Quote) nvm, feeling really stupid now. got it! I new I was missing something really trivial (thought I already tried that, but obviously I didnt) banging head on the keyboard
  • hi, currently stuck at root. I am root in the c*******r but dont know how to proceed from here. the usual things dont seem to work and the creds I found dont seem to work on ssh. I have the feeling that I am overseeing something really obvious. any …
  • hi all, i am currently stuck at foothold. i do have a couple of working cve's but nothing i could combine or chain for a rce yet. can someone pls pm for some assistance on how or where to proceed now. thanks
  • finally root; this was a great and 'lessons learned ' kind of box. I spend too much time on the wrong cve for foothold/user. lesson learned: make sure you check if the settings match the cve if they dont it is probably the wrong one and move on. reg…
  • halleluja what a ride. finally got root flag. I did not get a root shell but could read out the root.txt. if there is way to get an actual shell could someone PM me plz. would be interesting on how to achieve that.
  • Type your comment> @acidbat said: (Quote) I switched eu-server which worked for me then. thx
  • sanity check. i am having trouble with the machine being unstable. the webpages d****s responsiveness is very slow and sometimes the connection is just gone. I started yesterday and did initially not have the problem. after a reset it starts off wor…
  • woohoo. finally got root. made the root part harder on myself then actually necessary. in retrospective a relative easy medium machine, everything is quite intuitive to follow and no actual rabbit holes if you stick to the basics. user1 -> user2 …
  • surprised noone asked for a nudge yet :)))
  • Finally rooted. spend too much time with user on the wrong cve which was quite similar to the actual one but didnt work. Root is very easy compared to user and just needs some proper enumeration. Thanks to @MariaB for the help on user.
  • @MariaB , thanks a lot for reaching out.
  • could someone please reach out to me. I do have an exploit and I do get a connection back to my JR**L******* but i still do get a validation error (no context given) and my payload does not execute. I am not very familiar with the whole des*********…
  • Hi, I can also recommend the udemy courses from Heath Adams. They are sometimes offered cheaply , like around 20$ . He uses htb mschines (older) ones to explain the concepts of linux priv esc and Windows priv esc. Also you csn take a look at TryHack…
  • Type your comment> @zaphoxx said: (Quote) ok, i see now. that is a file someoneelse left there and the actual way to root is using a file like that but building it by userself first. ok, thats still a guess and hopefully not too much of a spoile…
  • hi all. yesterday I saw the a*****-**************.t**.g* file. However tody I wanted to download it and inspect it further but I cant seem to find it anymore. I used find / to try to locate it but it seems to be completely gone. I also reset the box…
  • Type your comment> @Salts said: (Quote) if you install the feline locally you will 'find' the file of interest in exactly the place where you found it on the machine. no guessing needed there and an easier way for me than fuzzing.
  • finally root ... of course it was the last exploit I tried ... it is always the last one *eyeroll*. but nice box that teached me some new stuff especially on foothold and user. my first openbsd box ... woohoo.
  • Type your comment> @zaphoxx said: (Quote) ok, nvm, after tons of trial and error I got it right.
  • Hi, could someone help me out please. I am stuck at getting the machine conviced to use user j. I have the -s********* part working. Maybe a nudge or a link to some additional info into the right direction would be much appreciated. Thx
Avatar

Howdy, Stranger!

Click here to create an account.