Official CrossFit Discussion

Type your comment> @TazWake said:

I can see why this is an insane machine.

I was stumped on root here :smile: . EDITED TO ADD: Rooted now but that was hard.

I think I know what I need to do but I cant get it to work. It doesnt help that I cant seem to get it to give me any troubleshooting data. So there could be a lot wrong with what I am trying but I cant work out what :frowning:

It doesnā€™t help that the entry I am relying on seems to get wiped every few minutes!

i did entry command as some value to the table after i selected the table, it succeed but i failed getting shell, donā€™t know why, i already planted my rev within the lf** fdm mes* dir , this is insaneā€¦ i canā€™t seems to make it work.

EDIT: ROOTED! , finally i found a method to get around it, definitely insane machine!
iā€™m down to help if any of you guys need it, just PM me.

really stumped here after finding ********.crossfit.htb but am failing to see any additional attack surfaces after landing

@blackaugust said:

really stumped here after finding ********.crossfit.htb but am failing to see any additional attack surfaces after landing

Iā€™d have a look at a single post and tamper with it a LOT.

What a ride !! I enjoy it ā€¦ If anyone need help ping me !

thx a lot @polarbearer and @GibParadox ! I learnt so much !
itā€™s definitely a hard box; the hardest Iā€™ve been through (with help) so far ^^

PM if needed ^^

finally rooted, with a lot of help along the way. I learned a lot - what a great box!

PM if you need a nudge.

Iā€™ve found an XSS in *********.crossfit.htb but not sure on what the next step should be. I can see from some of the comments above to look at /vendor/ also but I dont see anything of interest in the files found there. Can anyone point me in the right direction?

and so, a wonderful journey finally comes to its end.
(ok, i did root it a week ago, but only had time now to write something nice)

i really love this machine and all its challenges. thanks @polarbearer and @GibParadox !
and iā€™m so glad i picked this as my first insane machine.

of course i got help ā€¦ who hasnā€™t?
ā€¦ and of course you all know by whom :wink:

thank you so much @TazWake you are a real hero.

so, in order to pay back my debts, i am offering my help to anyone who is stuck.
i am more than happy to help you, but be prepared to show some effort! i wonā€™t just give away solutions :wink:

edit: ā€œby whoā€ or ā€œby whomā€? iā€™m going for the latter :slight_smile:

@UserAlpha said:
Can anyone point me in the right direction?
you might know, that an XSS on itā€™s own wonā€™t be worth a thing: most often you want to forge this vulnerability into something different.
think about what kind of services (other than web) are running on the machine and then think about how you might be able to attack them via HTTP (it wonā€™t work though)ā€¦ and then think about what would have to happen (or exist) that such an attack (i.e. via HTTP!) could succeed.

if you still need a hint (or if the above was too cryptic) just send me a DM :slight_smile:

I am really glad I was able complete this machineā€¦with a little help though ?. This machine has a lot to do with real life bugsā€¦ especially the user part. For those who are stuck, here are my hints

User 1- If you are struggling to find vhost , SSL certificates are the best source of finding them. Just like we do in bug bounties. Might be you find some vulnerability then, try to escalate it with other services running on machine. Many times there are services or domains which are accessible locally but not publicly.

User2 - You may find a public CVE however you may not be able to exploit it. Take a look again. If you have vulnerability in nth line of code, the execution should reach nth line before the vulnerability is triggered. To reach there, you may need to do some extra stuff, may be you find ftpadm credentials somewhere. Who knows??

Root - If you find nothing, may be try to see if any binary or something is executed every second. You may try pspy64 with -f flag. May be you need to reverse engineer something. Once you understand the logic, you may try the zip symlinking bug.

Let me know if I could help you in any way. You may give me the respect in return.

!!! Happy Hacking !!!

This is my first INSANE boxā€¦ felt super difficult, I have to get some help to get the root flag, the pspy64 was the hint, also the content under user2 home gives me another hint on what to do nxt

When @polarbearer & @GibParadox were designing Crossfit root. I wonder what made them decide to " turn it up to 11" for that user latteral privesc.

The sequence of moves to get there was insane.

Worst of all, when I first got it got it to return that revshell days ago, I ā€œthoughtā€ i understood how it workedā€¦but I didnā€™t, and just got insanely lucky while spamming possibilities inside of the small window. between each Langolier visit.

ā€¦but then the next day I couldnā€™t actually reproduce it in order to get back to that shell in order to keep goingā€¦or the day after thatā€¦for about four daysā€¦

Eventually, by trial and error and process of elimination I narrowed down the exact sequence of steps I happened to perform the first time around to get that lateral privesc,ā€¦yet I have absolutely no clue why it seems to only work in this particular way.

Also, the Langoliers were very, very hungry this time around ā€¦probably from doing all that crossfit.

Rooted! That final 6hr stretch latst night got us across the finish line.

After rooting, it was so nice to be able to analyze some processes responsible for the sleight of hand-like CRUD moves.

Also, while running this analysis from rootā€™s POV I stumbled onto something that made me question whether the path I took to exploit our** friendly crossfit langoliers** actually needed all the steps.

Mhh, Iā€™m stuck on the outside. Found the informational dns thingy, canā€™t get in anywhere. Possible to get a hint for tomorrow? Gotta get some work done today first. :frowning:

edit, nvm, thereā€™s no dns on the network, manually added it ,works now.

Iā€™m stuck on the lateral move to i*c. Have found the way and done the DB part but canā€™t trigger it as I canā€™t work out what directory the FilesystemIterator is working on (i.e. the value of $m_**r, which is defined in a file I donā€™t have permission to read). Can anyone give me a nudge? I donā€™t want the answer, just a pointer to how to work it out. Iā€™ve searched the filesystem for any obvious directories to put things in, but not found anything. Maybe I missed something obvious? Perhaps a permissions issue. I really hope this doesnā€™t just come down to guesswork!

Never mind - finally got there. Really enjoyed that - but ironically found the pivot to i***c the toughest bit. I really must have missed something! Respect to @polarbearer and @GibParadox.

I got the user, but stuck for a day to get root. Can someone give me some hints about this. I see the vuln php file, i got access to the DB that executed continuosly. I even clone that command from github to reproduce the bug. but canā€™t get any where, may be i miss something.

after trial and error for days got priv esc to iā€¦c really the toughest part. And now journey to the root is more challenging, after searching everywhere got something about /ā€¦/lā€¦l/ , /ā€¦/backup and messages table. Need more reading to get the correlationā€¦

Rooted! really challenging for the RE part. u got the logic, and there u go.