To all the peole that struggled with the Foothold, there is a modified tool of the Y***** serializer that can give you RCE with more complex command, just ask Google!
Stuck on root. I found the DB and the weird hash. I also found the fonction that hashes the original plain-text password but are we really supposed to reverse a hashing function on a “Easy” box?
Nah you don’t. You can submit the user flag, shut down the machine, and do the root flag later. You just need to gain access to the machine all over again. @longlivedavemustaine just did not get the correct user flag, apparently. It’s possible the machine was updated and you need to restart, or maybe someone hijacked the flag values, I’m not sure to what extent they protect it. No matter what restarting should help. (And btw @longlivedavemustaine I’d like to see you code a better website, theirs is pretty good. PM me once you’re done so I can take a look)
To your second questieon @thehermit254, first blood means the very first person to get the user flag, and there is another bonus for the first person to get the root flag. On easy machines this is usually in the first few minutes so you need to be there when it opens.
Ok, so I’m hoping someone can help me out here. I have found the DB and a hash that matches a hashing/encoding function found on this box. But the hash doesn’t appear to be anywhere near long enough based on the algorithm I believe is being used. Am I down a rabbit hole here, or have I missed something? I’m happy to DM someone who knows if you want more specifics on what I found.
for some reason i cant seem to get the reverse shell to catch, I have gone over everything and even now posted to reddit for help and tips and everything ive been suggested has not changed a thing. i sit with the listener, im using the correct syntax for the POC exploit, every time i run the POC i get “payload successfully sent” no matter what command i use for the POC it says it sent successfully, yet the listener doesnt ever catch it and any other command i run had no other output. none. im gonna contact support about this because there has to be something wrong. this same thing happened to me when i tried Sau too.
Hi!
I cannot achieve the execution of the exploit.
None of the exploits from “github” work.
I do as it says in the help.
I read the code myself (but I’m not good at python).
Tell me, please, does the exploit code itself need to be changed? Or leave it as it is?
The simplest commands don’t work.
EDIT:!!!
It doesn’t matter, I revised my approach and decided to gain a foothold through Burp using methods in exploit scripts.
To my surprise, it worked!
That was painful. One day spent on a false lead.
Some funny thing you can do, but it’s ultimately pointless:
If you send a contact form (not subscription in the footer) in a specific way, index page will include itself in error message. I thought maybe that’s an LFI opportunity. Looked too good to ignore, but nope.
I’ve managed to get user, the problem is every time i connect using the reverse shell after 10-20 seconds i lose connection to the box. Anyone else having this issue?
This was actually an awesome box in my opinion. Really easy user, root needs more digging but you’ll get there
User: a recent vulnerability was found in certain versions of something. Google is your friend.
Root: Dig in certain folders and you’ll know when you find something. Grep is very much your friend. Also the length of certain things isn’t what they’re supposed to be. Take that as you will
Hi there! I had the exact same problem, tried a bazillion different shells but the problem was the VPN. I re-generated a new HTB lab openvpn file and reconnected with that one and shell is stable