Official Busqueda Discussion

Try leaving the machine, changing your VPN server, reconnecting to VPN and rejoining the machine. Worked for me!

Im gettting the feeling I have done this box wrong, seeing a lot of python this, python that, docker, user cody, creds etc. but I have done none of this, I literally went:

1) Recon (20 mins)
2) RCE exploit to user (5mins)
3) Used our green buddies to find SUID and then abuse for root! (10 mins)

Can anyone tell me if they did this route? seems much easier than the python, docker, creds route??

1 Like

not sure if anyone can help with a small nudge on foothold. i have found the vuln and am trying to use our “sweet” tool to stop the encoding issue. i am using the shell cheat sheet but im feeling like im missing something with sending it off to the machine. maybe someone can let me know of a resource i can use to learn how to go about sending this? i do understand how the vulnerability works but its just using our tool i think is the issue to send it properly

EDIT: otter did a great job helping me without direct solutions

1 Like

dm

1 Like

Exactly, took some time for root, other than that i found this easy, usually different from a HTB ‘easy’ box .

can you give me a hint. After the user flag and running linpeas I am not sure which direction to take?

Send me DM if you are still stuck on this.

solid box

privesc is tricky - it took me some time to realize that I could use what I found to list what I could run. make sure you’re not missing any characters when you type into what you can’t see!

Rooted!

guys stop deleting the other’s stuff pleas this is not an attack and defense machine

hey guys,

can you connect to the port 22? I found the user and the password, but I get following error:

└─$ ssh svc@10.10.11.208
ssh: connect to host 10.10.11.208 port 22: No route to host

Thanks for your help.

What do you mean by green buddies?

I’ve been a cybersecurity professional for about 4 years now. Never used/needed hack the box. I finally decide to try it out and had a blast doing Sau. After today, I don’t think this platform is worth the time wasted on these silly boxes.

Not gonna lie, this box is pretty stupid. 5 minutes of OSINT and you can copy and paste your way to the user-- only to spend an entire day doing this “Easy” level root. I managed to develop exploits for 4 maybe 5 CVEs today just trying to get root…

  1. Nobody who cares enough to have that complex of a password is dumb enough re-use it.
  2. 1 singular function and/or syntax lesson was the answer.
    (Not sure if you box builders know, but in the infinite bytesteam of our field, tiny factoids aren’t “easy” to discover when you don’t know they exist.)
  3. There’s way too many rabbit holes. This box is vulnerable software galore. I opened AT LEAST 50 tabs of CVE’s that were genuinely relevant and applicable to this box. Every single one of them failed almost exclusively to just 1 config option being set to on. (9/10 times it wasn’t the default option.)

In fact, this machine has so many rabbit holes that I legitimately found out the secrets of Area 51 by just enumerating /var/www/.git. If you feel good about yourself for making a “secure” box, props to you.

Although it’d be a million times easier to just type ‘apt upgrade’ instead of sed’ing your entire etc folder. Just some advice for your next masterpiece @boxmaker.

133732

if you spend 50+ cves to try against this box? whats wrong with you?

idk how but HTB should find a way to not mix the hackers in one single machine. it was all cluster f…

im creating a script, another guy removes it, someone asks for machine reset, another one changes the content of my script…

as for the box. piece of cake for user.txt
gave medium for the root because of enumeration took a bit long to identify what’s going on and need some more insights other than googling CVE’s.

fun for sure.

Hello,

Someone can help with privsec?
I cannot modify the file to gain the root privileges.

Any advise?

Hi,

How did you modify the bash file to gain root privileges?

Hi again,

Are you talking about ./full-checkup.sh file?

DM me