Ellingson

user-question:
is cracking involved !?$6
if yes … my hashcat needs 12hours to finish :confused:
THANKS to ghost0437 for the help

Type your comment> @Skid3ow said:

user-question:
is cracking involved !?$6
if yes … my hashcat needs 12hours to finish :confused:
please help

Pm me…

I really enjoyed this box.

Is anyone who’s rooted happy to chat with regards to why one method works and one doesn’t? If so, drop me a PM.

Hey,
I have a low priv ssh shell, got a hash for the* user, cracked, but can’t auth…
Any tips?

There’s no more to be said …

![root_at_ellingscon](upload://lBgUohLooM8J8qc4NAcs3DAMuoi.png "icon")

All you need is in this thread.
Thank you @Phase and @killinem for your help!

What’s wrong with this password?
I found and cracked one hash, of course it didn’t work. Remembered post about passwords from Plague, modified pass few times - nothing worked.
EDIT: Plague’s post gives you hint about what type of passwords you can exclude from wordlist for cracking.

Type your comment> @dontknow said:

What’s wrong with this password?
I found and cracked one hash, of course it didn’t work. Remembered post about passwords from Plague, modified pass few times - nothing worked.

crack more hashes :slight_smile:

Spoiler Removed

Finally rooted. Very nice box, learned a lot of new things.
PM me if you need any help

I’m still stuck at the initial S** session. I enumerated possible Users (d***, m****, h** ) and Passwords (L***,S****,S**,G**. But unfortunately I have no luck with Bruteforce. Did I miss something on the page?

Wow, what a nice machine, one of my favorites :slight_smile:

I have learned a lot, congrats to @Ic3M4n

Complete no0b here. This is my second box, the first was NetMon.

Managed to fumble my way to a shell as a user after learning some coding and system calls. Remotely wrote my name on the list and walked into the Roxbury with a base user and found some hashes. Learning a lot about exploits and vulnerabilities so far. Love the nod to the Hackers movie. Working on privesc manually while letting some processes run in the background. Definitely a steep learning curve for someone who hasn’t worked with Kali Linux since before it was Kali…

Can anyone help me with hash cracking? Coz its taking too much time. So can i design custom list from default using Plague’s hint?
Finally cracked

yo im stuck to even get started can someone help me i always get suck trying for initial foothold

Can someone give me example/send me material how i can locate overflow length when i can not read esp?

Type your comment> @dontknow said:

Can someone give me example/send me material how i can locate overflow length when i can not read esp?

Do you know why you cant read $esp on this binary?

Type your comment> @TazWake said:

Type your comment> @dontknow said:

Can someone give me example/send me material how i can locate overflow length when i can not read esp?

Do you know why you cant read $esp on this binary?

No, should peda checksec give me a hint about it?

Got a shell using s** !! But now stuck ! I crack one hash the***** but when i change user it says authentication failed …! Any hint would be appreciated !! Help me!

Edit 1 : Succesfully get user.txt special thnkuu for @noobsaibot81
for giving me right direction

I managed to get root, but I had some issues with my exploit. It didn’t work when I tried to use one function and crashed in kernel mode (according to logs), but it worked perfectly fine with a different function.

Could anyone explain why that’s happening?

Type your comment> @dontknow said:

No, should peda checksec give me a hint about it?

Possibly, but is it a register on a 64 bit binary?