user1: forget hashes. forget cracking. forget {crypt}. The life is plenty of rabbit holes. listen inside the box what ldap wants to say. using tcpd*** is your friend. Be patient, the noise doesn’t appear fast. while it listens, go to take a drink with your friends. Saving the result in a pcap file makes easier to read. Bindrequest is the start of the authentication. Get focused on those packets…
NOTE: ssh credentials are not the same as unix credentials…
user2: ba****.*z is your friend. encrypted? password needed? use scripting such as 7zip-JTR Decrypt Script · GitHub and enjoy. After that read the content carefully.
root: two binaries are present. o*****l is ur friend. The other one… just another rabbit hole. Pay attention to capabilities and check if this binary has any relation with them. Do what you really want to do taking advantage of this binary. Is it possible to elevate privilege using that binary? Maybeeee…
Thanks for all the tips, but… my tcpdump inside the server don’t reveal any noise, even after hours.
tried -i ens33 & lo, dst port 389 and dst 10.10.10.119… nothing come to me, except when I generate traffic with nmap, jxplorer or ldapsearch requests.
Can you PM me please to point me my errors?
Thanks in advance
Most of the options you wrote are not needed. Maybe you should write it to a file, it’s easier to see the traffic. That worked for me.
So got user with some help! If your T*****P isn’t working maybe think about outputting it to a file for a more readable format. Worked wonders for me when I’d been stuck for a long long time.
I connected through ssh, run tc****p and export it in pcap file, waited over 2 hours, did it 9 times (9 different pcap files) but in all of them for user1 and 2 I only got the crypt values, the only simple was for ROOT but with no data, am I missing something?
Edit: Nr10 pcap did the job!
On to root, o*****l is a nightmare! any hints are welcome!!
Edit2: rooted! Thanks @brianma for your help!
User flag took about 1,5h of fiddling and reading about the software in use. Based on the posts here some people have listened the traffic some other guy initiated and therefore gave advise that’s gonna be a loooooong wait if there’s no one else doing the box.
If you can’t find anything by listening harder think of a place where you might have witnessed a weird delay with no clear explanation.
The climb towards root took me about 5h and I probably wouldn’t have figured it out in any reasonable time without the hints in this thread. They’re a useful resource when you hit a blank and can’t even figure out anything to google or learn that would help you.
So thanks everybody for the hints without outright spoiling the machine and thanks to the maker of this challenge. You guys “force” me to learn new stuff all the time : )
Hi guys… someone can give me an explanation about the root step and why it works ?
mhhh if you got the flag you should know why it works. Anyway, (un)fortunately this discussion gives away too much hints and spoilers after three months and a half. Just read it and you should have enough information to find the answer.
For those managing to get root.txt but not root shell, if you found the same article I found, you just need to read the rest of the article. It doesn’t take 44 days.