Official Passage Discussion

Type your comment> @Oxeeql said:

Type your comment> @gs4l said:

I have got user1. But can’t find a way to user2. I have read the above comments. Found a keygs directory in .loc***re. I guess something will be revealed by the files in it. Can anyone give a nudge, am I on the right path?

no, wrong path … it is way more easy :slight_smile:

Thanks . Was so easy that I completely overlooked it. Got it now

root@passage:~# id
uid=0(root) gid=0(root) groups=0(root)
root@passage:~# whoami
root

Fun box, pm for nudges

Rooted thx @N0xi0us for your help at the root part.

Shell easy af, just google
User 1: look for juicy info files
User2: Its right there, but can be missed
root: Again, its right there, think about the covid comment and stay at home, the interesting part can be missed as well, but after googling you might know it when you see it.

Delete if it contains to Spoilers

Rooted!!
This box is like way easy in the beginning to almost a bit hard in the end. Thanks @N0xi0us for the nudge in the end.
Feel free to dm for hints ?

Stuck at root. Only seeing cups as a service to exploit, but can’t seem to find any article/exploit related to this version.

Type your comment> @m1r3x said:

Stuck at root. Only seeing cups as a service to exploit, but can’t seem to find any article/exploit related to this version.

Usual enumeration and little bit of Googling with sensitive terms will give you a good article. :wink:

do i must crack the hash for get user?

Type your comment> @0xstain said:

do i must crack the hash for get user?

yes. crackstation is enough.

I’m so glad to see people have been enjoying the box so far!

I’ve seen some great nudges in this forum. I’m also open to feedback on the machine, so don’t be shy. PM me.

Here are my cryptic hints!:

  • Foothold: Bruteforce isn’t necessary, just be curious and google it.
  • User: Download your own copy and learn how it works. It will help you find the treasure!
  • Privesc: Look for rule-breakers! Sharing isn’t always caring.
  • Root: Stay close to home. Read a good book or write a novel! There’s plenty to do indoors.

Feel free to PM me for hints, tips, or nudges!

If you enjoyed the machine (or not), you can always leave a review & rating on the machines page.

Root!

Type your comment> @0xstain said:

do i must crack the hash for get user?

Hashcat may work with correct module mentioning. :slight_smile:

Rooted! Nice to have an easier box this week - thanks to @ChefByzen.

Rooted in the end after stepping over the clue a few times. Thanks @gs4l for the nudge. It’s a nice box @ChefByzen

Initial foothold : Google
User1 : Look around
User2 : Look around
root : Corona time, catch a bus and get back home; don;t come out #staysafe

Rooted :slight_smile:
If anyone need a hint, PM

got the hash from co**.php but can’t crack it . Any nudges?

Type your comment> @maskop9 said:

Initial foothold : Google
User1 : Look around
User2 : Look around
root : Corona time, catch a bus and get back home; don;t come out #staysafe

Rooted, thanks to this comment.

Certainly on the easier side of medium boxes. The best part is that all the steps are quite logical with no guess work involved. Props to the creator @ChefByzen for that.

All the hints have already been given in this thread. But if you still need a nudge, feel free to pm.

Type your comment> @sparkla said:

@CarbonDPG said:
I’m not the owner of the box (obviously), but F2B can be configured to detect (and ban) directory brute forcing.

Thanks for clarifying. Didn’t know that. How does it work? F2B works with “Jails” when banning failed logins, I never looked under the hood how it’s actually doing this.

Fundamentally, F2B is just a log parser. Create a new definition and scan for specific regex in the apache logs. Github link below to detect weblogins for example. Though in this case, you’re not scanning for POST requests in /login, you’re scanning for excessive POST or GET requests to any page. Add the new definition to the jail config, restart the F2B service and bob’s you uncle.

Alternatively, tear apart Chef’s F2B config files once you’ve pwned the box. Found out how he’s implemented it himself, the more you know!

@LegendHacker said:
got the hash from co**.php but can’t crack it . Any nudges?

Wrong file, right area but search deeper.

Spoiler Removed