Now on this (cap) I got user own finally after some hours. A few more hours in and I can’t make root happen. I’ve tried LinPEAS.sh even, but I also looked at the SUID services, looked up some of them in GTFObins (all but the “snap” ones. I’m not sure if “snap” will get me to the right path, and since I don’t know anything about “snap” I didn’t look further for now).
You didn’t read the out put well enough then. You took the same steps I did.
@SVARTBERG said:
(Quote)
My second box. First one was “Knife”, which I’ve done pretty easily with a little help from the forum here.
Now on this (cap) I got user own finally after some hours. A few more hours in and I can’t make root happen. I’ve tried LinPEAS.sh even, but I also looked at the SUID services, looked up some of them in GTFObins (all but the “snap” ones. I’m not sure if “snap” will get me to the right path, and since I don’t know anything about “snap” I didn’t look further for now).
I’m giving up right now because for some reason, every 30 sec or so, the server seems to be down for some minutes, coming back up for some seconds and going down again … Makes it too hard currently to continue.
You did well. Don’t give up. Rest a bit and go back to it with a fresh view. You’ll see it you will know it when you do. Good luck.
I got root, but not with hints from an enumeration script. I saw something fishy that I didn’t think was possible, and then replicated it. I’m still curious what configurations led to this error though. Please PM, I like to learn.
This is a really good box for beginners. I don’t think it was too easy, but just the right difficulty for someone who is getting introduced to information security. Not everyone can do the more difficult levels yet, so I think it’s a nice box for getting someone interested without being overwhelmingly difficult.
Here are my hints:
For user, I would find a tool good for reading pcap files. There’s a tool named after a fish (that has an entire week dedicated to it) that I found useful for this.
For root, I did not have to use any enumeration tools, but I did browse a few of the files and found one with a particularly interesting comment. Once you know what you can do with a certain language, you should get root fairly easily. I would read this article if you are having trouble with it.
Rooted!! Actually, this is too easy to be a hackthebox machine tho. Anyways…
User:
Remember 1 is not the first number you have.
Lazy people use only one password.
Root:
what are SUIDs??
Python is a lifesaver
This is everything you need to know to root this box… Hope thse might help you…DM me for any help… Thanks @InfoSecJack
hey do you get any issue with s*t**p command? or is there any other way
rooted lol the root part is still confuse me. im glad i learn new way of getting root but at the same time kinda frustrated on how much i was depend on hints. can someone tell me how did you figure that it is possible to use p***** to spawn shell?
Rooted! Easy box and thanks to @InfoSecJack for a good beginner machine.
Hints are already there on this forum. Try to analyze what you have in hand and play around a bit. You will get there eventually.
Remember, manual enumeration for root is always a good idea rather than relying only on the peas!
Just rooted it. Honestly one of the more relaxed boxes and continuing the trend of easy boxes actually being easy. A great box to start beginners off on. Also fun learning a new PE method that I hadn’t seen before.
It took me a while to figure out the user flag. Definitely an interesting method. Now finding root had me scratching my head because I had never heard of that PE method before, but great box!
Rooted.
It’s not so easy if you don’t know anything about the privesc vector but the machine’s name it’s a good hint.
Very interesting learn something new to get root.
If you are stuck with it just think on the machine’s name and study this link