Official Authority Discussion

I’m having trouble running sharpup on the host. Is it just me ?

This was a fun machine. Kudos to the author.

A bit late to the party, but if anyone needs help feel free to reach out :wink:

A few hints first :
User : Enumerate, dump, grep and crack. Then think about what you could do with your newly found powers.
Root: carefully read the output of your tool. What is allowed to perform what you are intending to do ? And what is not ?

4 Likes

hey everyone! anyone willing to help me validate some findings? I think I have something, but I got a bit stuck and not sure if I am not in a rabbit hole. Thanks

Solved it :slight_smile: ping me for support if you get stuck on the cert step

1 Like

For the ones that get the error Unknown DCE RPC fault status code: 00000721 or even the NETBIOS timeout error here is the thing you should try :

  • Add the dc to the DNS source /etc/resolv.conf file
  • Try to request the template using the Pwnbox machine
1 Like

Rooted.
Feel free to shoot me a DM if you’re having issues.
Let me know where you’re stuck and what you have tried.

2 Likes

Same here, but expect delays on replies for DMs. Really fun box, solid medium, that’s for sure.

I got some files for certain automation tool, got all the cleartext passwords, got encrypted passwords from this automation tool decrypted, managed to login to pwm. With some assbackwardery managed to find all users from ldap directory.

I see that pwm has some proxy user. Passwords that I found do not match to that proxy user.

I created a list of all usernames/passwords (encrypted/decrypted) found and tried hydra on smb, winrm and ldap. No luck so far.

I’m rather confused at what to do next. I am thinking of trying recovering ldap proxy password from pwm, but feels like I’d need to spend days in pwm source code to understand how it works. Feels like a rabbit hole.

It seems like the most logical thing is to do something inside of pwm. But I’m stuck at this point. Would appreciate a hint if possible.


Actually, I’m wrong about bruteforcing. I got some credentials to SMB, but it does not give me access to anything. :frowning:


With a hint from awesome folks I think I’m able to proceed to the next step.


And I got the user shell :tada:, now to the rooting part.

Just rooted, this is such a weird machine, the privesc is the first time that i do something similar…

If you need a nudge towards admin, feel free to DM.

Hi there!
I’m completely stuck… Already downloaded the files, cracked the hashes and enumerated all services, but I cannot use the credentials anywhere… Anyone available to give me a hint? I’m sure I’m doing something wrong… :cry:

if you ONLY cracked the hash(es), you didn’t finish the job

Yes!!

@JimShoes already pointed me in the right direction :smile: :smile:

Thank you very much both :grin:

Thanks! I wanna feel desperate first :slight_smile:

Also, the name of the machine + what I saw in automation scripts kind of give me an idea.

Finally!!
I’d rate user as easy and root as insane :slight_smile: - but only for me …
… had the solution already but it wasn’t working as I had a small typo in one of the command options.
So I’ve thrown it away and wasted 3 whole days looking for an ā€œalternativeā€ solution :man_facepalming:

My hint: If you get some errors look at the -help sections of the tools you are using. Some tools share the same options but in a slightly different way/syntax. So don’t copy & paste them blindly.

My VM made this so much harder than it needed to be.
Half the commands and tools i needed in the end did not work out of the box and needed to be fixed first :dizzy_face:

Guess i have to go through some retired windows machines to check which of the tools are actually working and which are not :man_facepalming:

3 Likes

feel u bro

1 Like

Anyone willing to dm a nudge in the right direction? Im close to finished foothold but stuck on the last part