Official Previse Discussion

Type your comment> @Prim1Tive said:

im stuck and i dont know if im in the right way.
i found a******.**p is creating a low priv user is part of the CTF itself?
That is a good place to start.

Iā€™m stuck in w** user, i have the hash of m*** user, but no idea on how to crack it. Someone can give some tip plz.

Edit: stuck at privesc now

EditĀ²: Rooted. It was very funny machine who brings me some new knowledge. Thanks for everyone for the tips, specially @sharkmoos.

That was a super fun box, very much enjoyed it!

Iā€™ll try and give a couple hints that differ from whats been hinted at
foothold: enumerate enumerate enumerate (ok, so thatā€™s not really a new hint, but whatever)
user: donā€™t freak out if you see something weird, just treat it like you would anything else
root: How do you know where something lives?

So Iā€™m on the a*******.**p page and I believe I need to become a ā€œpostmanā€ here. Do I have the right idea? Because this does not seem to work. I may also be making a silly mistake.
EDIT: Turns out I was actually making a silly mistake.

Type your comment> @ExCommunicado said:

So Iā€™m on the a*******.**p page and I believe I need to become a ā€œpostmanā€ here. Do I have the right idea? Because this does not seem to work. I may also be making a silly mistake.

Make sure you are adding what type of content it is (and using the correct one)

#Rooted
Pm after youā€™ve tried all :slight_smile:

Well rocking the hash doesnā€™t work and my method is fine because my own userā€™s (known) hash cracks instantly so the format and everything is correct. Do i need to go digging in the Seclists to find that special wordlist that the creator had in mind?

Type your comment> @tang0 said:

Well rocking the hash doesnā€™t work and my method is fine because my own userā€™s (known) hash cracks instantly so the format and everything is correct. Do i need to go digging in the Seclists to find that special wordlist that the creator had in mind?

Like most of the hash cracking on HTB, one list rules most of them.

@tang0 said:
Well rocking the hash doesnā€™t work and my method is fine because my own userā€™s (known) hash cracks instantly so the format and everything is correct. Do i need to go digging in the Seclists to find that special wordlist that the creator had in mind?
rockyou works fine for me

Ok so rockyou didnā€™t work with john but it worked with hashcat. Did anyone else face the same issue? If yes, what might be the reason?

Rooted, funny. Its hard not to loose own path on the rocky roads:D

Rooted. Back to basics on this box.

root@previse# id
uid=0(root) gid=0(root) groups=0(root)

This is a good box, except for the thing with the hash. Time-wise, the hash was a bit too difficult for my liking. In the end, it took me 16 minutes - out of the estimated total 25 min for the entire rockyou.txt wordlist - using john inside of my VM.

I liked the final privesc step, as years ago I could see myself making the same exact mistake years ago when it came to that one particular command.

Type your comment> @NetIceGear said:

This is a good box, except for the thing with the hash. Time-wise, the hash was a bit too difficult for my liking. In the end, it took me 16 minutes - out of the estimated total 25 min for the entire rockyou.txt wordlist - using john inside of my VM.

I think its something with your setup, or maybe john, it took me a few seconds with hashcat

This was fun! Really solid easy machine that keeps it simple without seeming like things were intentionally misconfigured. I think this is one of the more realistic-feeling machines on HackTheBox.

There are potentially some unicode issues depending on your environment, so google around a little to resolve them.

Spoiler Removed

@tang0 said:
Ok so rockyou didnā€™t work with john but it worked with hashcat. Did anyone else face the same issue? If yes, what might be the reason?

I had the opposite.
hashcat did not work but john did - when i gave john the correct format argument.
oddly hashcat did get my userā€™s hash but not the one that i did not know already.
I think I know why though - my userā€™s pwd was only a few charactersā€¦

1 Like

With john you need to format it for md5 longā€¦ (itā€™ll even ā€œwarnā€ you when you start without any formatā€¦ after that itā€™ll work with rockyou just as fine as hashcatā€¦

And Iā€™ll need to review my setup thenā€¦ it took a ā– ā– ā– ā–  53 minutes to crack it!!! Several people saying that it just took a few minutes/seconds with themā€¦ wtf?! =/

Sessionā€¦: hashcat
Statusā€¦: Cracked
Time.Startedā€¦: Sun Aug 8 15:59:35 2021 (53 mins, 34 secs)

I also had a lot of issues cracking the password.
Iā€™ve tried both with john and hashcat.

I had foothold in 5 min, and lost 2 hours trying to get lateral movement. After I tried cracking the hash with both john and hashcat I started looking ofr other lateral movement paths, until I got really stuck and asked for a sanity check, when someone confirmed to me that the hash was crackableā€¦ so I ran hashcat againā€¦ and againā€¦ and only on the 3rd or 4th time it cracked. I dont know why, but apparently a lot of people is having trouble cracking this hash.

After that it took me 4 minutes to rootā€¦

Could have gotten first blood or at least top 25, butā€¦ oh wellā€¦ So if you find the hash, dont give up on first Exhausted :slight_smile:

Rooted! If you canā€™t crack the hash try using --format with john, that worked for me.

1 Like