Official Jewel Discussion

@pufferty said:

I got real slow cracking with hashcat and bcrypt 624h/s. Im using a rtx 3080. that cant be right?

Double check you are using the correct mode. It should crack in a fairly short time.

@TazWake said:

@pufferty said:

I got real slow cracking with hashcat and bcrypt 624h/s. Im using a rtx 3080. that cant be right?

Double check you are using the correct mode. It should crack in a fairly short time.

Or put in other words: When it takes a long time, it wasn’t the correct the hash :wink:

can i get a nudge on cracking the hashes? I found more than 2, having trouble getting the right dictionary for this. I am running hashcat and ran jtr both with the B* algorithm but it doesnt seem to be able to crack. I found the search engine but i believe i need to crack these hashes before i priv esc so i can use the password to run s***

Got root! Very nice machine! Learned so much about new things!
Foothold is hard when it’s compared to privilege escalation. Timing created a huge problem for me to do 2 F* thing. But I used a mobile app, then it’s finally done.

PM for nudges

Are user (b***) password crackable? I’m like 1h in rockyou and can’t can’t manage to crack it and I’m quite stuck on that
EDIT:
It is but right hash need to be bruteforced

Type your comment> @SovietBeast said:

Are user (b***) password crackable? I’m like 1h in rockyou and can’t can’t manage to crack it and I’m quite stuck on that
EDIT:
It is but right hash need to be bruteforced

are there any hints on the machine that clued you into any patterns for the mask? like b*** likes special characters, password length X, etc ?

Type your comment> @unkn0wnsyst3m said:

Type your comment> @SovietBeast said:

Are user (b***) password crackable? I’m like 1h in rockyou and can’t can’t manage to crack it and I’m quite stuck on that
EDIT:
It is but right hash need to be bruteforced

are there any hints on the machine that clued you into any patterns for the mask? like b*** likes special characters, password length X, etc ?

@unkn0wnsyst3m b*** is a user, I wasn’t sure if this was a spoiler or not so I mask it, but if you are struggling with cracking user password you are probably looking at wrong hash of this user. Right hash are cracked in seconds with john and rockyou. I missed it at first but then I ran linpeas and after that I was able to use right hash

Type your comment> @SovietBeast said:

Type your comment> @unkn0wnsyst3m said:

(Quote)
@unkn0wnsyst3m b*** is a user, I wasn’t sure if this was a spoiler or not so I mask it, but if you are struggling with cracking user password you are probably looking at wrong hash of this user. Right hash are cracked in seconds with john and rockyou. I missed it at first but then I ran linpeas and after that I was able to use right hash

Ok thanks for the feedback. I have 3 hashes and already found the one from linpeas, hmmm I’ll look at my John commands again.

got it, i must have overlooked it sigh…thanks!

Rooted, not a fan of the system used. Had some PTSD from a time when I had time sync issues.

rooted, foothold was annoying, root was really easy.

rooted! The foothold got me for a few days. Privesc wasn’t too bad.

Need nudges for foothold here!

@kurogai said:

Need nudges for foothold here!

There is a CVE you can use.

Type your comment> @TazWake said:

@kurogai said:

Need nudges for foothold here!

There is a CVE you can use.

I think i found it, can i pm you?

@kurogai said:

Type your comment> @TazWake said:

@kurogai said:

Need nudges for foothold here!

There is a CVE you can use.

I think i found it, can i pm you?

Yes

rooted finally. overlooked a few things as usual. i swear i gloss over obvious things and i’ll never learn… PM for hints if anyone is still trying this box.

any help with root pls?

@k01n said:

any help with root pls?

Look at what the account is allowed to do as a super user.

I think I found the exploit… I manage to make it work locally but when I do it on the real target it doesn’t work, any advice ?