Official Chemistry Discussion

You should be getting a call back check your netcat listener.

Hint: u can use curl to directly display the root flag without needing to crack the hash
by this PoC just try to combine some LFI payloads with curl on localhost:8080

I was being a dummy I got it finally.

Make sure your ip is correct in your file and netcat is listeningā€¦

anyone facing issue with uploading the file iā€™m not able to do it

My god finally!, got my first machine after some problems with root :sweat_smile:, anyway was so fun, i hope iā€™ll complete more.

Iā€™m stuck at app user, is the hashcat bruteforce a rabbit hole? Could someone help me please?

edit: I got it, for anyone in the same position: seclist can help and --show too

We shouldnā€™t always aim for reverse shells. Sometimes simple enumeration does the trick.
Interesting foothold, enumeration and basic concepts gives us root.
Enjoyed it quite a bit, nice box :wink:

Finally!!!
https://www.hackthebox.com/achievement/machine/455735/631

DM me if you need any help, i will give some hints.

Got rootā€¦ nice box. Had funā€¦
feel free to ask, if youā€™re stuck.

2 Likes

Does anyone know what to do after getting credentials? Kindly DM!

be precise, u got creds of a user, even though there are many hints in forum, use these creds, get something u are missing. DM if you to ask something

For some reason I couldnā€™t get the reverse shell of this box

I tried this first then I also tried using a bash script but still couldnā€™t connect to the netcat server.

Am I the only one who is struggling in it

i need help to get the root flag i got the passwd for rosa already and the user flag

Do I need to crack the hash found in the db

Yes, itā€™s md5. Use john for example.

Check for connection: netstat -tuln

Use busybox payload

HINT:

Summary

GitHub - 9carlo6/CVE-2024-23346: This repository contains a Crystallographic Information File (CIF) intended for use on the "Chemistry" machine on Hack The Box (HTB).