My summary of this box is rather straight forward, user is stupid easy and is all u need to find the creds needed to access the Web Interface. A tips is to make sure you are seeing it all, look for interesting files and consider that the creds found might be old (will make more sense when u see the creds). After getting access to the Web Interface look for “Authenticated Remote Code Execution”
Hey guys, I got the part and know which part to exploit but i can’t figure out how to create a good payload for the ******.**1 file. Can someone dm me to give me a pointer.
@aladante said:
Hey guys, I got the part and know which part to exploit but i can’t figure out how to create a good payload for the ******.**1 file. Can someone dm me to give me a pointer.
I’m in the same place… a nudge would be great, thanks in advance…
Hey guys a little nudge to the right direction would be appreciated.
I got the .dat and the .old and the .bak files but i’m not sure what i’m looking for there :DDD
Thanks for the machine! User flag took only a few minutes and was deceptively simple. Root flag took about an hour of reading through articles and finding two different security vulnerabilities regarding the product and then finding a tool for the latter part.
After root flag I did get a deeper look at the tool and related blog post of the vulnerability to understand how it works which took me an extra 30min and a cup of coffee.
Can someone DM me afew tips on this machine? I’ve spent a good while on it and i can’t seem to get anywhere, I’m new to this so any advice would be very welcome, Thank you
At this point, I got admin access to the webapp, there is a potential RCE that can be ran but I am not able to make changes to the code and the arguments to the script that can be ran seem useless. Can anyone give me a clue on this? Thanks…
@aladante said:
Hey guys, I got the part and know which part to exploit but i can’t figure out how to create a good payload for the ******.**1 file. Can someone dm me to give me a pointer.
I’m in the same place… a nudge would be great, thanks in advance…
I’ve rooted the machine now, very nice box! Enjoyed it plenty.
User: Come on, so easy, no hint required.
Root: Look at your .bat and .old files. Sometimes within other files. Think of the year we are in now. Look at sensors and what you can add. Try arguing with a powershell example.
I’d like to add that this was one of the worst boxes on HTB, imo. Resets every few minutes even on VIP did not add to the enjoyment of pwning.