Nest

Looking for some help, been at this a while:

I’ve enumerated the low port, got tmp user creds, authenticated with that, pulled all the files I can. I’m hung up on the base64 encoded string in RU****ml, I feel like I need to make sense of that to then connect via LP although can’t get that to resolve to anything. Spent lots of time playing with chef to try and make something out of it, no luck. I’ve moved over to a windows box and redone my enumeration bc I heard it might help viewing some files - hasn’t yet.

As for the higher port, connecting via telenet I can’t read any of the files though I’ve got some good information as to what is running on the host (LP) . I keep trying to view the files listed at the bottom of co****ml although can’t.

Still confused as to what service is running on the high port and if I should be trying to connect to it using an actual service instead of telnet. When searching google for the banner of the high port all that comes up is pastebin post with answers I don’t want lol PM nudges would be appreciated.

Thanks!

Type your comment> @TestUserx said:

Type your comment> @squirrelpizza said:

(Quote)
same here. i even ran it through SQL Server, since it can natively decode base64, but it still ends up being a bunch of gibberish

If you base64 decode the first password hash it actually does look like a password (complex but still a password). After trying all combinations of overcome usernames and passwords without a match I realized that the hash needed some special handling to turn into a valid password. Don’t know if @VbScrub did this intentionally but I was tricked by it initially.

Finally rooted the box. Shout out to @Radixx for nudges, really appreciated. I’ll try and summarise my nudges here for others to visit and move along.

Initial foot-hold

Enumerate, download files, carefully read them. You’ll get something that can be used again to enumerate the service, and now you won’t be that extra unwanted guest in the system.

User

You need 3 very important pieces of information from all the files you gathered in the last step, to move forward. One of them may seem very insignificant but it is the most important one. You’ll have to move through the dark but this “Insignificant” piece of information will guide you to the destination. Once you reach your final destination, assemble all the pieces together, and get the user flag.

Root

Once you have the user, enumerate the service again, download all files. You might see an empty document but it is not empty, it has important data flowing through it. I used a windows machine for this step. Assemble all the pieces together and enumerate the other service now, because now you can. At this point you’ll need to find, one readable and one non-readable file to get the root. You will need to spy on the non-readable file to get the information you need to reverse the other readable information.

Shell

PS. I love you.

NOTES:

  • There will be no shell, till you get to root, so don’t even try.
  • The machine has all the information, no need for the guess work. Keep digging.
  • Fiddle with the code, you might not need Windows.

Got the root finally.

For final step, dont’ ignore the .exe file you got. What can you do with an exe file if you’re not able to run it? Maybe tear it apart? :wink:

Aaand thats a wrap… got root. for people who don’t have much experience working with windows in pen-testing or laid off a bit in windows vm(like me) , it might be a bit of a challenge. Has anyone done it purely on linux machines? if yes, dm me. i did it mostly on linux, but had to jump to windows.

Awesome box, finally rooted in Intended way. No shell required till the root smb is enough and need to windows OS in some parts. Thanks for the hints and this box @VbScrub.

stuck with the project file.any hint?

I am stuck on the last step now. I think I know the way roughly to get the password, but it is not working by replacing the cipher

Type your comment> @ekenas said:

Type your comment> @TestUserx said:

Type your comment> @squirrelpizza said:

(Quote)
same here. i even ran it through SQL Server, since it can natively decode base64, but it still ends up being a bunch of gibberish

If you base64 decode the first password hash it actually does look like a password (complex but still a password). After trying all combinations of overcome usernames and passwords without a match I realized that the hash needed some special handling to turn into a valid password. Don’t know if @VbScrub did this intentionally but I was tricked by it initially.

Yup, i found what i needed for that hash, i’m just waiting for visual studio to finish installing now :))

This box is not “Piece of cake” at all. It’s more easy/medium box.
Imo, the admins should reset the user rating after the unintended method got patched.

Box is a bit CTF but it’s a great introduction to windows RE.

If you PM, please tell me what you have done so far or I cannot help you.

Hey I am having issues on the last step.
I managed to get H* L* .exe, the empty file and H* _C* _B* .xml, but when trying to run it with mono:

“Please ensure the optional database import module is installed”

I am using Linux probably that’s why I am having so much issues with running the exe

Type your comment> @kan3k1 said:

Hey I am having issues on the last step.
I managed to get H* L* .exe, the empty file and H* _C* _B* .xml, but when trying to run it with mono:

“Please ensure the optional database import module is installed”

I am using Linux probably that’s why I am having so much issues with running the exe

And from windows the same message…

Type your comment> @Cli3nt said:

Type your comment> @Mouuzartt said:

Type your comment> @sniperhack said:

USER: completed.
ROOT: found the exe file, but not sure on how to use it, since I have not a shell on the machine (I took user flag through smbclient…)
furthermore, I have not found the high port, even after nmap/masscan… any hint?

how did u make that with smbclient. I already found some credentials on the Template, but idk where to use those credentials, can u help me out

What about, you connect to open ports with these credentials.

smbclient \\\share -u

I think it works. replace for the target ip and for user you found.

Type your comment> @bhtnaves said:

could someone give me a hint? i am really noobie and even didnt find smb version

I think you can use msf for this.
take a look to auxiliary/scanners/smb.

Type your comment> @darvidor said:

Type your comment> @Cli3nt said:

Type your comment> @Mouuzartt said:

Type your comment> @sniperhack said:

USER: completed.
ROOT: found the exe file, but not sure on how to use it, since I have not a shell on the machine (I took user flag through smbclient…)
furthermore, I have not found the high port, even after nmap/masscan… any hint?

how did u make that with smbclient. I already found some credentials on the Template, but idk where to use those credentials, can u help me out

What about, you connect to open ports with these credentials.

smbclient \\\share -u

I think it works. replace for the target ip and for user you found.

Actually its capital -U
smbclient \\\\{ip}\\share -U {user}

I used telnet 4**6 port but i cant find the user/users, i’m newbie pls help me

This box was great. Enumeration is #1 key to complete this one.

User 1

  • Leverage ports that are open
  • Consider a common potential misconfiguration on a service
  • Enumeration

User 2

  • Leverage the same service that you get a juice from
  • Enumerate more
  • Reading all the config files is important on this step
  • You might need to leverage a Windows/Online Compiler to debug to get a juice for the 2nd user

Root

  • The author of the machine is clever, and he didn’t put something in directories for no reason. So don’t overlook anything :smiley:
  • The process to get a juice for admin user is pretty similar for the 2nd user
  • If you get an error, google it for what that is
  • IDA might help you in this process to identify what you need

Thanks for the great box. Please PM for any help. Enjoy! :slight_smile:

Rooted … Fun box (like RE)

@JungleManJack said:
Looking for some help, been at this a while:

I’ve enumerated the low port, got tmp user creds, authenticated with that, pulled all the files I can. I’m hung up on the base64 encoded string in RU****ml, I feel like I need to make sense of that to then connect via LP although can’t get that to resolve to anything. Spent lots of time playing with chef to try and make something out of it, no luck. I’ve moved over to a windows box and redone my enumeration bc I heard it might help viewing some files - hasn’t yet.

As for the higher port, connecting via telenet I can’t read any of the files though I’ve got some good information as to what is running on the host (LP) . I keep trying to view the files listed at the bottom of co****ml although can’t.

Still confused as to what service is running on the high port and if I should be trying to connect to it using an actual service instead of telnet. When searching google for the banner of the high port all that comes up is pastebin post with answers I don’t want lol PM nudges would be appreciated.

Thanks!

Go back to the files you got.

Research them.

Check all possible paths.

Don’t make assumptions.

@kan3k1 said:
Hey I am having issues on the last step.
I managed to get H* L* .exe, the empty file and H* _C* _B* .xml, but when trying to run it with mono:

“Please ensure the optional database import module is installed”

I am using Linux probably that’s why I am having so much issues with running the exe

I also had that error in Windows.

When I execute the script in an online compiler, where do I place RU_Config.xml? Do I create another window in the online compiler and paste in the username and encrypted password? Or if I did this in visual studio, do I just have the xml file in the same directory on Windows explorer?