Official Investigation Discussion

yep sure

Just rooted the machine, i would say that its a bit annoying with all that poking around but overall i liked it… For anyone stuck feel free to drop a PM

4 Likes

Any hint on what to search thru the log file? :slight_smile:
Edit: got it

Pretty good box I think. DM me if you need any hints

1 Like

Hello
I’m stuck on the log file
Does someone have any hint on that plz

Rooted !!

1 Like

Rooted!

User:

Use your linux tools for the log, it will make the search a little easier

Root:

The dragon will guide the way

2 Likes

:mag: ROOTED :mag_right:

Entertaining and easy machine :grin:

Send DM if u need help :hugs:

ROOTED :partying_face::partying_face::partying_face:

Category: CVE and Reversing (basics)

Initial foothold: The web maintain a service with a vulnerable component. Its pretty straight-forward - when you reach it you will bump into a basic filtering (mentioned here couple of times) - to bypass it just use another techniques that not involved the blacklisted thing. (its took some time to figure it out, but when you are you will feel stupid of how easy is that)

User.txt: One of the greatest things to do when you start the OS enumeration internally is to check what other users participated and what files they are owned - when you reach it you will need to investigate it not in a proper way (if you are familiar with that) but read the messages to get the lead.

Root: Its seems pretty clear, do your regular things - it will lead you to some tool. As mentioned above use the dragon + if you more familiar with other languages, ChatGPT to convert it, its straightforward there.

1 Like

Rooted and I think this machine is releatively easy among other mediums.

The Reviews in web site is really funny :rofl:. I like the jokes about exiting Vim and good memories

3 Likes

This box was fun, both user and root flags need a “forensic” investigation approach. Look at @devi4nt’s post above for some nudges.

On the user, there is a common mistake that users make which can end up leaking something important.

1 Like

Rooted :green_heart: fun to investigate.

hey guys! i got the root user but htb doesn’t recognize flag. what’s a problem?

I’m new to reverse engineering, I got the dragon open, but still can’t seem to wrap my head around how the c*** function works, and how we can control that; am I on the right track? I’m able to bypass the initial checks and enter the main part of the program, but still can’t seem to control anything

edit: Finally got it!! Many different perspectives are key when understanding what the program does! One size does not fit all