Official Fuse Discussion

Type your comment> @VbScrub said:

Finally got round to trying to get root on this and was successful fairly quickly (once I’d rewritten one of the PoC tools in VB of course). Pretty much just look at what your account is allowed to do, google it, and you’ll find some examples and code to help.

I don’t really agree with people saying that needing to use VS is a problem. The free version will do everything you need.

At the end of the day HTB exists to help you learn/practice real world hacking techniques, and if one of those techniques requires you to install a completely free piece of software on the world’s most common desktop OS, I don’t think HTB should feel like they have to avoid that.

In a real world pentest, you can’t expect your customers network to be tailored specifically to the OS and tools you prefer using. If you’re attacking Windows machines, I think its perfectly reasonable to expect you to have a Windows machine and be willing to use a free tool like VS. If you don’t like that then maybe stick to attacking the Linux boxes

I totally agree with you. We need to know both sides. Linux and windows… and more

i got a list of users and have tried to enumerate with them but cant find a path for the initial foothold, can someone please give me some direction?

***UPDATE - i was able to get creds

got user …
thanks to @ferreirasc for making me try again, i have it; but not use info correctly.

Would appreciate a nudge towards initial foothold. I have a list of users which I put together manually via enumeration of the app, and I am able to confirm that they are valid users, but can’t seem to get beyond that.

I noticed that r******* allows logging in without anything, but the actions I can perform are very minimal.

EDIT: Got initial foothold, even if you are being cool make sure to be cool with the right flags.

Type your comment> @adnanthekhan said:

Would appreciate a nudge towards initial foothold. I have a list of users which I put together manually via enumeration of the app, and I am able to confirm that they are valid users, but can’t seem to get beyond that.

I noticed that r******* allows logging in without anything, but the actions I can perform are very minimal.

Check all the commands you can use inside the tool r*****e*t and you will get a hit when you notice.

Do you need to get User2 after getting the user.txt flag in order to proceed further ? If so, I’d appreciate a hint, I’m kinda stuck at this point.

Thanks !

Type your comment> @Chobin73 said:

Rooted…with complains.
The foothold indeed was a good sneaky thing…thanks to @SanderZ31 for pullinge me out of swamps.
Root is a totally different thing.
No, really, this is not at all something that depends of the “hardness” of a “medium” box.
I’m not into the argument that you need a win box to go ahead: this is ok. If you want to exploit windows you must have some grip on MS, then sometimes using windows is a “must”.
The point is that what you need to go ahead is an “ability” not linked at all neither to the vulnerability itself nor to the capability to spot out a path to root and not even on the understanding of windows internals.
Am I really expected to spend days debugging my own rig to root a “medium” box just because this git compiles only on that specific platform? :confused:
Thanks also to @ellj for addressing me to the binaries: you probably also saved my marriage!! :lol:

Agreed

have user list ,and download print log try to login, use r**c****t tools enum something .but not get creds.can someone please give me some tip?
please PM me ,thanks!!!

Stuck trying to get root… Would appreciate some nudges to get me on my way.

Update:
Rooted, thanks to all who helped me along!

Rooted. I enjoyed this one. I learned a lot as well, given that Windows is a weak point for me.

Stuck on user for a couple of days now. I have creds, but cannot find a way to use it despite extensive enumeration. I’ve been pushing treacle up a hill. Can I please get a nudge, much appreciate .

Type your comment> @HardBar said:

Stuck on user for a couple of days now. I have creds, but cannot find a way to use it despite extensive enumeration. I’ve been pushing treacle up a hill. Can I please get a nudge, much appreciate .

Find the right enum* command (-c), we are speaking about print***…

Type your comment> @choupit0 said:

Type your comment> @HardBar said:

Stuck on user for a couple of days now. I have creds, but cannot find a way to use it despite extensive enumeration. I’ve been pushing treacle up a hill. Can I please get a nudge, much appreciate .

Find the right enum* command (-c), we are speaking about print***…

I could honestly kick myself, thanks for the nudge :star:

Type your comment> @HardBar said:

Type your comment> @choupit0 said:

Type your comment> @HardBar said:

Stuck on user for a couple of days now. I have creds, but cannot find a way to use it despite extensive enumeration. I’ve been pushing treacle up a hill. Can I please get a nudge, much appreciate .

Find the right enum* command (-c), we are speaking about print***…

I could honestly kick myself, thanks for the nudge :star:

:wink: it happens to me often we look too complicated.

Can someone give me a nudge on initial foothold?

Edit: NVM got it

Finally rooted. Thanks to @d188878 and @xbforce for nudge on root. Indeed VS2019 works just fine.

Can anyone be kind and PM me with some help with the initial enum. I have a list of users from the web app. My windows enum skills have been exhausted. I’ve read the other comments and think I know what I should be looking to. Just want to know if I’m heading in the right direction. Ta.

Edit : Never mind. take a look at the flags you can use on that cool tool.

could someone be so kind as to give me a nudge, got rc**** as bn***** and got some more but stuck!.

Aaaahhh, the privesc is a perfect opportunity to try the commando VM

I’d appreciate a nudge for root. I can compile ELD**** with VS 2019, but the application won’t execute on the victim machine.