@Avinash said:
Hi, im new to the boxes i’m not getting the process perfectly. the only thing i have done so far is anonymous login with ftp. No clue so far. Can anyone give me an advice for this.
Once you’ve logged in through that service, enumerate the 2 directories that are there. Retrieve the files. You’ll need to use a tool to get the contents of one of the files(google the extension + linux tool), then use the info you get to access the other file. Hope this helps.
@NullDay said:
I can’t seem to download b*****.mbd but was able to download a*****-*******.zip is this ment to happen or is it a issue?
I ran into this same problem during this step, turns out I just had to use a different tool to get the file. Also make sure the file size on the server is the same when it ends up on your drive.
@h00ligan said:
I have read every bit of the rs man pages. Even thought about how a lazy sysad may set this up to make it easier. I have tried every variation of rs to make it work, but I’m not getting no where. I have been at it for over 7 hours. Someone please PM me with some help! Also i’ve read through almost all 31 pages of this thread and still cant piece it together. I’ve also tried running in windows cmd prompt. Am I supposed to be trying to r****s on the A*****.exe file or the other *.ino file that is referenced in the *.lnk?
Yeah i was off on the r***s command by a long shot, but thanks to @ophelia for setting my thought process straight.
Phew user access was pretty straight forward - didn’t need any non default tools
getting root was a different story. Struggled to get a payload on the system until I learned can use certutil (nice trick)
I couldn’t run scripts with the cmd - maybe because of formatting
Built a standard windows exe reverse shell and got connection but no output so had to resort to meterpreter.
Didn’t have any issues with reading the root.txt but I think may have been fixed by another user.
Honestly don’t think I would have gotten the priv esc on this one without tips from forum. If anyone good at windows priv esc could pm me with how they might find to use the tool with the switch required I would be very grateful.
This machine is pretty fun. Thanks for @deltaplus for hints.
But I still have a question. When I look in forum, so many people manage to solve this machine via r***s with using cmd switch. I couldn’t manage to do that. My syntax is correct because it worked on my localhost. If anybody have thoughts about it, PM me to discuss.
Also I read this forums and get the rs spoiler unfortunately. I may not be able to solve this machine without it. If there is anybody that find his/her way without the rs spoiler, can you PM me to discuss the way that you find this vulnerability? I mean is this vuln. can be found with an enum script or by looking to services,processes or etc? If you can teach me that via PM, I will be very glad.
Also If anyone need help with this machine, I can give you some hints.
can’t get any output from the particular command that helps executing as admin, i dont think i am having wrong syntax. can someone help me on that. hit me up on DM.
I numerated ports, found access, download files, found users/pwds but I am stucked now.
As this is my first box, may I get any hint from anybody ?
Is here any way how to locate more easier boxes until used to environment ?
Thank you in advance !
@goxy2101 said:
I numerated ports, found access, download files, found users/pwds but I am stucked now.
As this is my first box, may I get any hint from anybody ?
Is here any way how to locate more easier boxes until used to environment ?
Thank you in advance !
Hello everyone,
“Access” was my first Box on hacthebox, and my 2nd Box ever I try to root after kioptrix level 1.
The box is easy, and I completed it in a day. left me with a lot of things I learnt about. The problem I faced is that i tried to accomplish the goal using the any method than the clear one :D.
I managed to get user.txt by myself. After spending more than 10 hours trying something else than the direct clear F** method.
For the root part, I also spend a lot time trying to deliver tools that allow for path the hash, but found it blocked. during this time I learned a bout the certutil new functionality.
After that I came to forum looking for tips. first issue for me using the R***S method is that no output comes back to you. then you had to test the command first on your machine.
Then I was able to get a copy from the root.txt to the low privileged user directory. but every time I try to access it I get (Access is Denied) even after manipulating icacls.
After a good night sleep I decided to try pipe instead of copy and boom it worked.
There still a question in my mind:
The common used way is the R***S. is there any other method I shall try to get root ?
Finally I’d like to thanks the Box Creator, and every one in the forum who left a tip.
Just rooted, wow did I get a crash course in windows privesc here… If you made it this far, the hints are in this thread, research that command everyone is talking about, just remember that you aren’t passing a command to it directly! it only runs a certain type of thing – flag if spoiler