Official Buff Discussion

Type your comment> @k4wld said:

Type your comment> @ue4dai said:

I feel stupid for asking, but I cannot get any exe tools onto the box. The exploit works to get that webshell, and often others have left tools laying all over the place. But I’m stuck trying to figure out how they did that. Using c–l does begin but only ~1.3k ever transfers, then after a few minutes times out. I am not seeing what the issue is. I assume something on the box? There was mention of error in exploit script but I’m not seeing that either. The easy Win boxes always have some “WTF?” moments for me. :slight_smile:

The c.rl tool works just fine on this box. Maybe the tool that exposes the download link on your “attacker” box has an issue or your internet connection is bad? … Try it locally first is and see if the download works at all.

Thanks @k4wid for the sanity check. Yes, the old standby python httpd seems to be working fine. With wireshark up see lots of TCP retransmissions to Buff. n-.e-- did finally go through just once, but it was extremely slow. There’s no iptables involved either. Very odd.

TCP 1397 byte retransmissions begin right away after HTTP 200 from Buff to Kali VM. Not seeing any responses from Buff after that, just seems to stall. ???

~~Hits a “Maximum execution time of 120 seconds exceeded …” in the webshell. ~~

BTW: This happens regardless of calling from webshell or reverse nc initiated from webshell (should someone have left nc on there).

Ok. Well. Apparently Buff via HTB VPN via home router privacy VPN connection == unhappy Buff. Not an issue on other boxes that I’d noticed. C’est la guerre.

@AHam1lt0n said:

Is there really a walk through on this machine though it’s not retired?

SMH…

@Rayz said:
You will be surprised of how many…

Most machines (except the insane ones) have several walkthroughs available within a week or two of their release.

Most of the walkthroughs are password protected meaning people need something (it used to be the root flag, now is it normally the admin/root hash) which proves they’ve “already completed it” to read the walkthrough.

Hackplayers on github used to be an awesome resource for this because, for me at least, reading how other people pwn boxes is critical to the learning experience but waiting 3 - 4 months means it loses a lot of value. YMMV.

Hey guys! This is my first Windows machine attempt so really sorry if I ask any stupid questions. So far, I’ve managed to find the exploit that generates a shell on the victim machine but then I found out that I couldn’t cd into any other directory. I thought that maybe I could try to create a reverse shell to my machine using msfvenom (windows/meterpreter/reverse_tcp) and maybe then I would be able to change directories. However, while I managed to upload the shell.exe onto the victim machine, running it didn’t cause anything to connect to the handler I’d setup. Is there a possible reason for this? Also, even though I’ve seen the .exe’s left by other users and kind of have an idea of the path they took to get the User flag, I really don’t wanna follow it without first trying my own approach and understanding why it’s not working so any help at all would be really appreciated. Thanks!

Type your comment> @TazWake said:

@AHam1lt0n said:

Is there really a walk through on this machine though it’s not retired?

SMH…

@Rayz said:
You will be surprised of how many…

Most machines (except the insane ones) have several walkthroughs available within a week or two of their release.

Most of the walkthroughs are password protected meaning people need something (it used to be the root flag, now is it normally the admin/root hash) which proves they’ve “already completed it” to read the walkthrough.

Hackplayers on github used to be an awesome resource for this because, for me at least, reading how other people pwn boxes is critical to the learning experience but waiting 3 - 4 months means it loses a lot of value. YMMV.

indeed.
most of the times you can find a lot of things you missed by reading what other players did…do players still submit solutions to hackplayers? havent checked since the flag rotation thing happened.

@Rayz said:

indeed.
most of the times you can find a lot of things you missed by reading what other players did…do players still submit solutions to hackplayers? havent checked since the flag rotation thing happened.

I think it has pretty much died there, which is a real shame.

@Zaghw said:

Hey guys! This is my first Windows machine attempt so really sorry if I ask any stupid questions. So far, I’ve managed to find the exploit that generates a shell on the victim machine but then I found out that I couldn’t cd into any other directory.

Re-read the exploit, it isn’t a shell.

The POC creates something that looks like a shell but, if you look at the nature of the exploit you might be able to work out why a shell isn’t an option.

I found using a browser to continue the attack was the easiest way, just remember the POC code contains a few errors in the instructions.

Type your comment> @TazWake said:

@Zaghw said:

Hey guys! This is my first Windows machine attempt so really sorry if I ask any stupid questions. So far, I’ve managed to find the exploit that generates a shell on the victim machine but then I found out that I couldn’t cd into any other directory.

Re-read the exploit, it isn’t a shell.

The POC creates something that looks like a shell but, if you look at the nature of the exploit you might be able to work out why a shell isn’t an option.

I found using a browser to continue the attack was the easiest way, just remember the POC code contains a few errors in the instructions.

Thanks! Yeah, I eventually decided to read it more carefully to understand what it actually did. However, I still don’t understand why the reverse shell I created with msfvenom didn’t work. I also tried modifying the POC so that it executed a reverse shell using PHP code I found online but that also didn’t work. Eventually, I tried using n****t like everybody else seems to be doing and that also failed. At this point, I’m not sure if this is a connection issue or if I’m missing something.

@Zaghw said:

Thanks! Yeah, I eventually decided to read it more carefully to understand what it actually did. However, I still don’t understand why the reverse shell I created with msfvenom didn’t work.

Unfortunately, there could be lots of reasons for this.

I also tried modifying the POC so that it executed a reverse shell using PHP code I found online but that also didn’t work. Eventually, I tried using n****t like everybody else seems to be doing and that also failed. At this point, I’m not sure if this is a connection issue or if I’m missing something.

It is difficult to say as a lot depends on the “how” and how you’ve got the tool onto the box.

I’m struggling to get my escalation to root to work. I’ve tried remote tunnel and running locally and get connection refused for both methods.

If anyone is able to help, or has solved the same issue, I’d greatly appreciate a DM!

@11o said:

I’m struggling to get my escalation to root to work. I’ve tried remote tunnel and running locally and get connection refused for both methods.

If anyone is able to help, or has solved the same issue, I’d greatly appreciate a DM!

Depending on how you’ve tunnelled it might need some changes on your attacking box.

I get the same “connection refused” after building an .exe and running on the box as well. Would you expect that with what you’re thinking may be the cause?

@11o said:

I get the same “connection refused” after building an .exe and running on the box as well. Would you expect that with what you’re thinking may be the cause?

I never tried building an exe but it does imply the problem is something on your machine is blocking the connection.

Hello all,

I am stuck trying to get root on this machine. I have uploaded and ran p***k.exe and I believe I have successfully mapped the local port to my kali box’s local port. I found a couple of exploits on the publicly available db while playing around with the payloads but not sure what I am doing wrong. Can someone please dm me if possible?

Type your comment> @orc said:

I am stuck trying to get root on this machine. I have uploaded and ran p***k.exe and I believe I have successfully mapped the local port to my kali box’s local port. I found a couple of exploits on the publicly available db while playing around with the payloads but not sure what I am doing wrong. Can someone please dm me if possible?

It’s a simple BOF and you need to modify a important thing to get it work.

Hello guys, I am new here.
why when I am trying to connect to Buff using netcat. it’s doesn’t get listen but if I used curl and check the connection. it works…

Rooted.

I agree with other comments - this is ideal as an introduction to HTB.

Type your comment> @Zaghw said:
I thought that maybe I could try to create a reverse shell to my machine using msfvenom (windows/meterpreter/reverse_tcp) and maybe then I would be able to change directories. However, while I managed to upload the shell.exe onto the victim machine, running it didn’t cause anything to connect to the handler I’d setup. Is there a possible reason for this?

yes.
Nowdays, metasploit is pretty much known to all antivirus companies.
Defender is active on the box.
Your exe gets blocked and deleted by AV.
you need to think more creative way :slight_smile:

Seriously! Why are people constantly resetting this box?? There is absolutely no need to!
Try harder!

@k4wld said:
Type your comment> @ue4dai said:

I feel stupid for asking, but I cannot get any exe tools onto the box. The exploit works to get that webshell, and often others have left tools laying all over the place. But I’m stuck trying to figure out how they did that. Using c–l does begin but only ~1.3k ever transfers, then after a few minutes times out. I am not seeing what the issue is. I assume something on the box? There was mention of error in exploit script but I’m not seeing that either. The easy Win boxes always have some “WTF?” moments for me. :slight_smile:

The c.rl tool works just fine on this box. Maybe the tool that exposes the download link on your “attacker” box has an issue or your internet connection is bad? … Try it locally first is and see if the download works at all.

Or just get a shell and use powershell…

Finally rooted! The root part was more frustrating than hard, getting the exploit to work was a test of my patience lol. Big thanks to @Notorious1 for the help!