Official Driver Discussion

any nudges for root?

Do your basic enumeration. Look thoroughly and donā€™t ignore anything. There is a ser**** that can be exploited. DM if you are still stuck

Could anyone give me some hint on the foothold? I have tried to upload my reverse shell payload but it did not work. I also tried something on the s** service but I did not get any luck either.

Thereā€™s a hint in this forum that will help you. Look into attacks dealing with smb file uploads.

2 Likes

Fun box! I learned a new technique that I didnā€™t know. Congrats @MrR3boot!

1 Like

Any nudges for root?

Finally Rooted !, Great box. I was facing issues and then tried resetting the box.

Foothold: First you need to upload to get the ******* then break it and use it elsewhere to get the access.

Root: A service is what you need to look for.

DM me if you are still dont find it.

2 Likes

Done, reset the VM the it works :upside_down_face: I dont like this box.

#######
I spent a night to investigate the issue, I worried that it was my kaliā€™s issue since I found it worked suddenly after I reverted my kali. But it turns out that if the target box has been running for quite a time, weird issuees observed including:

[*] Connecting to **:10.10.11.106[\PIPE*]
[+] Bind OK
[-] Failed to enumerate remote xxxxxxxxx
The NETBIOS connection with the remote host timeout

Or instantly Connection Failed.

Reset the machine and exploit it quickly can solve it.

Finally rooted! This definitely took a while. Learned some new things about Windows, thatā€™s for sure.


Foothold

Use a Windows-specific attack. Having a lot more experience with Linux machines, I wouldnā€™t have been able to figure this one out without some hints on this forum.

User

Get crackinā€™ and then check out your nmap again. This was the easiest part for me.

Root

Iā€™m still having bad dreams about getting this one to work. I instantly knew the vulnerability to exploit (this box really hits you over the head with hints for this), but actually making it work was a serious pain.


If you need some help, PM me!

There is an error with the flags, am I the only one who indicates that are invalid?

Box might need to be rebooted

I did, and nothing

Rooted, One of the Interesting machines ever.

DM for nudges

Massive respect to @sharkmoos for the nudge. Awesome personā€¦ :slight_smile:

Managed to root the box, but i still donā€™t know why the scheduled task part was a rabbit hole, i saw it under administratorā€™s own and got it to be triggered, someone know why please dm me or tag me here, thanks a lots

Foothold was harder than I initially thought it would be when I saw that file upload option but definitely interesting. Keen to hear if other people did it the exact same way I ended up doing it.

As for rootā€¦ as soon as I saw a certain folder combined with the OS, I thought I knew exactly what to do (as it just happens to be a specific exploit I spent some time looking at last year) but no matter what I do I just keep getting Access Denied. Tried resetting the box and tried 3 different methods of adding the thing that triggers the exploit but all give the same access denied error. Starting to think I must have missed something obvious :upside_down_face:

EDIT: I did get past the access denied error but turns out I was barking up the wrong tree. Thanks to @StrbryTrndo for telling me to give up on that avenue. The actual root path was much easier thanks to some off the shelf tools that do all the work for you. Time to do some research and see exactly how they work.

Thanks for the fun box @MrR3boot

2 Likes

The only scheduled tasks I found that were of interest were the ones simulating a real person doing something (to allow the foothold exploit to work). I guess weā€™re meant to ignore them because in the real world they wouldnā€™t exist. If youā€™re referring to something else then send me a DM if you want to discuss

Because it is configured with run as _username_, check again with schtasks.

Rooted!
Cool box, very well designed from start (it gives a hint of what type of exploit it will be needed). After all the hype of 0-Day extreme exploit, and not patched for a while :confused: , i wanted to give a try on it.
Here my hints:

USER: The basic php upload that you are used in linux is not the way. Start to be familiar on Living off The Land mindset.
( This was the hardest part for me since i didnt knew it )

ROOT: At this point you have a ideia of what it will be necessary. Google a bit around, bypass difficulties, and driver it crazy until it gives you root.

What a cool nightmare box! Goodluck for you all :slight_smile:

why did people mark this box as easy?!

2 Likes