Official Authority Discussion

I have never hate a machine like I hated this one before lol!! I really need to learn some windows :stuck_out_tongue:

Thanks to @JimShoes and @tanfoglio for their suggestion about trying a different tool, still trying to figure out why it worked with one and not with the other but thats homework now.

So my main hint for root will be: if you think you are in the right path but still failing give another similar tool a try :wink:

1 Like

I sat in that for 24hrs
 Other path and boom :slight_smile:

That was a ■■■■ of a privesc! Didn’t realize how close I was for soo long until it finally clicked. Haha. If you’re struggling with root (or any stage really) take a break, RTFM for any tools, and pay attention to the details behind any errors you’re getting. Debug mode is definitely your friend.

Feel free to DM for a nudge, but please start with what you’ve tried and what you’re trying to do. Otherwise good luck and happy hacking!

1 Like

I get the hash’s answer and find the web service. How can I get the foothold.

what to do with this credentials

Hi All,

A bit stuck on the last bit of the privesc, if someone can give me a DM that would be great!

Thanks!

@dewdrop0247 dm :otter:

me too :smiling_face_with_tear:

I stuck in decryption

Amazing machine !!! I learned a lot !!

1 Like

for those who got privesc, can I DM to bounce some ideas?

Hey guys, i need help. I decrypt and try many expĂ©rience. Like crackmapexec, ldapsearch
 but i don’t understand what i can do with they credentiel.

here is the trick lol, give more disk space to VM and avoid doing that on aarch64 if possible :smiley:

this trick doesn’t help dude ^^

Maybe your initial scanning result would help you :thinking:
something interesting to look on

ok i have many beug on the website 
 I have user flag. Ty everyone !!

I have find a way to escalate to root, but missing something :confused:

I have the creds extracted from the an***** v**** (not sure if that’s too big of a spoiler, so playing it safe), and have figured out how to make the application connect to the back end, but I’ve been banging my head against a wall for the past few days trying to make anymore progress from there. I’m not all that experienced in pentesting in the Windows world, would anyone be available to DM me and get me pointed down the right path?

The privesc is kind of hard, but also quite easy when you grasp the concept.I had issues with certain python tools that could be useful, however, latest kali running py3.11 and those tools crash. Whereas they work on py3.10.

pyenv is a very useful software, similar to nvm for node that allows easily downloading and using different versions of python w/o replacing the system python and breaking other tools.

I can’t tell if this is supposed to be a response to my post or standalone, but on the assumption that it’s a reply I’ll say I haven’t even gotten a foothold yet, let alone to the point of being able to privesc, I’m still banging my head against P** trying to see what I can accomplish with very little base knowledge of Ac**** D******* and L***, though I will definitely keep Python version in mind when I get there. I will second that pyenv is a fantastic tool and hugely useful for exactly cases like that