This box definitely took me a long time to get… But still very new to the hacking world, so learnt a crazy amount with just this one box. Finally managed to get root, but also didn’t understand the b****** part. I found it and read it, but didn’t see the connection. Makes it more annoying when all the comments say “its right in front of you” but you just cant get it… A PM about it would be great please. Want to see what i missed in prep for other boxes.

Thanks to everyone in the comments though. The subtle nudges here and there really helped!

After hard boxes like BigHead and HackBack, hacking this machine is pretty easy and pleasant leisure. It would be a mistake to miss this box. Catch the time to hack it before it retired.

It was really pleasant for me to pass it again although I already passed it a long time ago.
Like traveling in the past, when I thought that Irked was a hard challenge.

Found the user.txt file have no clue how to read that, can someone give me a little tip?

Alright, I hate asking for help, but i cannot figure out how to get root. I think i’m close to root, but i just can’t manage to escalate my permissions. i managed to figure out the user.txt. Can someone nudge me in the right direction for root?

I have low priv shell, user.txt, b***** file and I have read a lot of steg stuff, I have checked all the challenges, next step is to buy a Desert Eagle .50, it was a pleasure guys LOL

Edit: I also realize in b***** file the K***** code but nothing to do with that, not in the web at least.

2nd edit: got user :slight_smile:

Have the user SSH access. Anyone have some hints about proper method of privilege escalation ?

priv esc hints anyone?? I might have tried most methods i guess ;_;

Nevermind, I just rooted this baby :slight_smile:

And only with one small hint from

Struggling to solve the steg part. I was learning about steg a while ago but appear to have forgotten nearly everything. I think I’ve pull some info but unsure how to use, so far all attempts to use where I think it should be used have failed.

May I ask what is the proper way to do a full port scan on HTB machines? Every time I did it, it took forever and never finished.

Any hint to get root?

Got User.
Any advice for the privesc? Anyone want to PM me more ‘specific’ hints, this is my first privesc.

Complicated box for me, but hey I’m root, google was very help for me :smile:

Hey Guys, Any help to get root would be appreciated. This is my first box on here and I was able to enumerate and find file which led me to getting the user.txt file. Afterwards I review the process and try a few basic escalation techniques which didn’t workout. I than ran a another enumeration tool and I believe I know the exploit to get root but for some reason any variant isn’t working. Any thoughts on it, It almost annoying like a C0w that out of milk.

Guys, I need a help with root, I can’t figure out which binary with suid use, any advice ?

@giggi0x00 look deeper into those SUID’s, look for something you might be able to control within them

Awesome beginner machine. Really good for those getting used to pentesting and a little fun CTF type challenge for user

Foothold: Enumerate! You don’t need anything besides nmap and msfconsole

User: a CTF like challenge. Find the first piece of the puzzle doing basic enumeration of files and directories and then the second piece is just thinking about what you may have seen already if you visited the ports from nmap.

Root: This part is really trivial, although remember the machine is called Irked for a reason, so what is needed for doing the privesc maybe hiding in plain site, just think of the normal privesc methods (cron jobs, PATH, setuid, kernel, sudo rights) and go through them. HINT: you don’t need a kernel exploit here.

So far this is my favorite ‘beginner’ box that I’ve done.

found the .b***** file and the k code inside but no clue what to do with it. Any help would be greatly appreciated. thanks

@goetia said:

found the .b***** file and the k code inside but no clue what to do with it. Any help would be greatly appreciated. thanks

The first line has the hint what you need to do.

Got it! thanks, a little patience goes a long way. On to root now.