Rooted. The final step needed patience
Would appreciate some help with steps after user. I have been playing with a L** for K***** but when I check ports open the port shown in /etc/k*****/k*****.yml is not running. When I try what the PoC shows on port 9*** it just errors out. Not sure what I’m missing…
Update: Nevermind…
Type your comment> @wish said:
I have found some B**k details and some q****s …is this a right path …how to use this info…
i have same question with you,any hints?thanks
If you stuck, you can PM me.
Can someone PM me on how to get the user k?
Tried enumerating, running pspy and even looking at online documentation.
Found a CVE but unsure how to get the syntax right
Cheers
I quite liked user, I learned a few new words :-).
Root was believable… kinda.
Good box.
Type your comment> @Nick said:
Type your comment> @wish said:
I have found some B**k details and some q****s …is this a right path …how to use this info…
i have same question with you,any hints?thanks
nothing yet…
Type your comment
I am stuck with the priv esc to root.
Anyone can PM me with some hints/nudges?
Nearly there I think.
Type your comment> @macha2230 said:
I am stuck with the priv esc to root.
Anyone can PM me with some hints/nudges?
Nearly there I think.
same boat…
I’m trying to escalate through root. I understood what to do. When I try to run .co* files, it’s giving some errors. Also, I tried to add --ph.se*ngs argument. Need some nudges here…
edit: got root! Forget the lines above. It is misdirection.
My advice to everyone for the root path:
Check the configuration files related to that app you saw.
I have to admit I do not like CTF-ish machines at all.
But this one is very well designed to make you work with the whole ELK stack.
Thumbs up for JoyDragon, he did a great job for that.
Here is my hints:
- User: The picture give you the key to control/find the needle in all the data you can gather.
- root: Sense the version of things to get the banana. Then, enroll yourself in a commando to execute your will to the last element of the stack.
I hope it helps
Just got root, this was my first box and i’ve spend about 20 hours on it.
It was way harder then I anticipated at first. Learned alot of new stuff, hope I’m more prepared for new challenges now since I was not really prepared for the “puzzle” part of this one.
If you don’t give up on this box you will eventually get it, this thread has alot of info to tie it all together. GL!
Type your comment> @wish said:
Type your comment> @Nick said:
Type your comment> @wish said:
I have found some B**k details and some q****s …is this a right path …how to use this info…
i have same question with you,any hints?thanks
nothing yet…
Finally got user…
I have no idea what to do once I get access to the initial user. How do I do a privesc to the k* user
I just need a nudge to go from s* to k*. I looked at the R*M file I ran the script nothing.
Type your comment> @wish said:
Type your comment> @wish said:
Type your comment> @Nick said:
Type your comment> @wish said:
I have found some B**k details and some q****s …is this a right path …how to use this info…
i have same question with you,any hints?thanks
nothing yet…
Finally got user…
great job!!
i still stuck in here,any hint for me?thanks alot
Hello guys
Just started haystack.
Could you tell me if the needle.img is connected with steganography? Do I need to use steganography tools to obtain some information from this picture?
Edit: Ok, I found it
Hint: use e.g. burp guys!
I found the p…: s******.i*.k** but it doesn’t seem to work anywhere, I ve tried some default users front door, didn’t seem to work, is it a rabbit hole or am I overthinking it? Hint pls x)
EDIT: Okey that was stupid from me, when you find the p… don’t be excited and forget to see what else is there
thanks @penturmeade for the Hint: “if you found the password, the user is very close by”