the root part was too fun, keep in mind that you don’t need to overthink about useless stuff.
Thank you, 7u9y! Pretty good machine
Congratulations! That where I am stuck currently any tips or advice?
Pwned! this machine is very straight forward!
DM if you need a nudge.
I cant connect to the box. It says “Initialization Sequence Completed” but it doesnt look like it stopped running.
Great question. Answer is virtual hosts.
Simplified explanation:
Virtual hosts are another website hosted on the same server as the main site.
The web server looks at the "Host: " header to decide which hosted website to route the traffic to. A single web server can have thousands of virtual hosts (and did, back in the day…).
Your tools will send different combinations to “foo.htb” with different “Host” header fields like “admin.foo.htb”, “api.foo.htb”, “dev.foo.htb” until the “foo.htb” web server returns something.
This is a common trope on HTB boxes.
could someone please tell me how to generate a crash file ? I am quite sure to have the way of root but i need a real crash file and all my attempts didn’t generate one …
Really a simple and straightforward machine !
But ■■■■ slow when you play the shared one with other and all of the reset because the thing has crashed so foothold is like impossible.
try using another VPN
I’ve successfully accessed the shell, but I’m unable to locate any .crash files in the /var/shell directory. Do you have any insights on this?
someone on the same box as me succeed to create one so i got the root . But I still don’t know the command to create it …
Try using another VPN server, it worked for me.
Can’t say that was a easy box, since I have a lot of troubles for user flag. The root flag is what I expect for easy.
I have tried switching VPNs and restarting VMs. I still can’t get a crash file within /var/crash… so frustrating. Any ideas?
So switching VPNs to Free worked… so frustrating.
Nice curve ball with privilege escalation. DM me if anyone needs a nudge.
■■■■ nice hint
https://www.hackthebox.com/achievement/machine/335227/577
Rooted the machine. Thanks for the hints @7H31NTR00D3R
I got foothold but I can’t find a way to get to the user. Tried absolutely everything
Can someone give me a nudge?
The vulnerability which you use to discover in foothold, maybe it can access local?