Official Health Discussion

Hints:
User: There is one functionality on the box. Exploit it. You are a hacker, so try to get to things you are blocked from. Once the postman has delivered you the results, then you can try to find information about versions and vulnerabilities. Sometimes other peoples work will not work, so you gotta do things yourself.
Root: There is one functionality on the box. Exploit it, again. Look at how it might work from the inside.

1 Like

Who gives the difficulty rating for boxes? Less then 50 roots in the first 24 hours on this easy box?

1 Like

first of all, this box shouldn’t have been rated as easy, re-assessment is needed

user flag:

  • you see a web server that does some checks, maybe you can use it for callbacks;
  • however you cannot check the interested addresses, maybe you can consider a delivery redirect.
  • from the inside info can you now progress, from the source should you check
  • an old wound may hurt its back, all you need is a needle to stab.
  • from the needle you received some ■■■■, maybe the ■■■■ is up for a crack;
  • yet the ■■■■ is so ■■■■, finding the right shape is like a hike.

root flag:

  • at the back there are many threads, some are running with excessive rights;
  • same way in and same way bad, same way stored but different ways left.
  • to leave the place in a different way, into the store would be great;
  • where’s the key to this place? a veggie scroll can help to trace.
  • what’s in the store shall we break? what todo shall we make?
  • todo what or what todo? in the store, both are true.
4 Likes

This box is broken, after booting and going to the IP I get this:

If I go to the http://health.htb got the same error:

I can only nmap the box…

I mean it’s obvious that the box has run out of space and the error is about that, but it is even possible running out of space if the only action taken against the box is a nmap scan?

If any one need help pm me

For anyone struggling with the foothold: in situations where error messages are withheld by the target a local installation can help greatly!

2 Likes

Hello guys!, Have you paper where understand the vulnerability? or any source for testing?

yes it’s ssr* attack goodluck

Can anyone get user? I tried redirection but coulnd’t get anythin on **** port

Phew… finally rooted… that was a “fun” box :smiley:
For the user flag:
Find a way to trick the web app to “health check” itself and you will see the filtered content.
After you do, make sure that you enumerate it well, a common vuln will take you further down the road,
it will be very helpful to try to install it locally so you can fine tune your payload before sending it.
If you are successful you will acquire a new piece of information which can be turned “usable”.
I found it easier to just reuse the app’s logic instead of using the well known tools.

For the root flag:
Here there is nothing more to say, the hint from @JacobE can give you all the information you need.

Feel free to PM me if you get stuck anywhere :wink:

4 Likes

User: Bore inside, exploit known vuln. I eventually scripted send and receive in python, which helped alot with manual exploitation of the known vuln. I don’t think you have to, but I stumbled about blind. Loot what you can. RIP all users with slow laptops. Took 2 hours on my Hardware.

Root: A walk in the park, no hints needed…

Overall a very nice machine!

Rooted! Satisfying box, but initial foothold took some consideration!
Don’t get discouraged if the “known vuln” doesn’t seem promising at first. Maybe it just doesn’t understand the dialect you’re speaking? :slight_smile:

When it finally gives you what you want, the kitty will only accept the salted snack if it’s presented in the right way. Perhaps you should test with some other snacks first to make sure you’re feeding it right. Otherwise, that may be the end of the line for you…

Root is easy. No hints needed. :3

Ah yes, another “medium” box.
Best advice on the thread if you ask me.

Rooted. learned a lot from this machine.

Rooted, fun box to do, lots of techniques which were enjoyable to discover

Nice box! Thanks @irogir !

FOOTHOLD : a simple service and a special port at scan to pay attention at.
USER : identify service running and search for cve.
ROOT : the check service can be tricked changind data.

I wrote a custom proxy from socket level up to make me comfortable and at home in what would otherwise be a “gated community”. Very interesting to do; handle user requests, trick the remote application, and then serve parts of requests back to the user. About ~150 lines of Python, but it taught me a lot about concurrency and handling HTTP (requests and responses) through TCP-sockets.

I’m now moving on to exploiting; I’m really excited.

Hi, I have not read any of the hints in this forum but I was wondering if anyone would know where I could download the old version of Gogs to replicate it on my system to test out the sql injection to see if I am doing something wrong as I believe it is the path forward. Please dont spoil, if I am on the right path or not, I would like to try to do this one completely by myself! just need help finding the old software for testing. Thanks ahead of time!

Hey. You can download the source code from here: Release v0.5.5 ¡ gogs/gogs ¡ GitHub