Official Previse Discussion

I have analyzed with Burp Suite, I have found strange things, the problem is that I have not found a way …> @TazWake said:

@kr4k3n said:

I can’t get a foothold :l

Enumerate. Find things that look odd and request them from the server. Use this to find other pages which might be useful. Visit them, tamper a bit and get access.

When you have access grab the thing you couldn’t access before and look at what it contains. Examine the stuff - get the loot (for later) and find something you can exploit to get a shell. Exploit it, get a shell.

I have analyzed with Burp Suite, I have found strange things, the problem is that I have not found a way …

Type your comment> @7Rocky said:

@z3r05i6n41 use your own PHP code

To crack the password hash and get 2nd user…?
I’ve used the kitty and the other guy and nothing is working. Hash is identified and I’m using the correct formats. Am I missing something?

@kr4k3n said:
I have analyzed with Burp Suite, I have found strange things, the problem is that I have not found a way …> @TazWake said:

@kr4k3n said:

I can’t get a foothold :l

Enumerate. Find things that look odd and request them from the server. Use this to find other pages which might be useful. Visit them, tamper a bit and get access.

When you have access grab the thing you couldn’t access before and look at what it contains. Examine the stuff - get the loot (for later) and find something you can exploit to get a shell. Exploit it, get a shell.

I have analyzed with Burp Suite, I have found strange things, the problem is that I have not found a way …

Those strange things can still work if you submit them in the orange greatness.

super fun box!

@kr4k3n said:

I have analyzed with Burp Suite, I have found strange things, the problem is that I have not found a way …

In Burp, you probably just need to visit a page, see what it points to, analyse the response, tamper with it, get access.

When you get access, you can download a new thing to analyse. You can exploit that with a post request.

@TazWake said:
@kr4k3n said:

I can’t get a foothold :l

Enumerate. Find things that look odd and request them from the server. Use this to find other pages which might be useful. Visit them, tamper a bit and get access.

When you have access grab the thing you couldn’t access before and look at what it contains. Examine the stuff - get the loot (for later) and find something you can exploit to get a shell. Exploit it, get a shell.

Thank you, I finally made it B)

Can someone give me a nudge? I’m logged in, was able to get the file with the dangerous code (I think) but I don’t know how to get a shell from this…

Alright, so day three and no cracked hash. Can someone please PM me?

@z3r05i6n41 said: > Alright, so day three and no cracked hash. Can someone please PM me? Check the format and password list. If you have the hash, exactly as it is shown in the output, it should crack with john pretty quickly.

Is there any one to send a hit. I can not find nothings.

Wow. User was a lot harder than root! Fun box. Can’t really think of anything more than what has already been said that’d be helpful other than once you have the item that everyone has already mentioned, you REALLY need to review what’s contained within or you’ll probably overlook your way onto the system (I definitely did!).

ROOTED o/

Thank u all for the tips. Was stagnant to run my payload in ***s.php , but after that pwd

@zenter said: > Is there any one to send a hit. I can not find nothings. Use nmap to look for open ports. When you find some, enumerate them further.

Type your comment> @TazWake said: > @z3r05i6n41 said: > > Alright, so day three and no cracked hash. Can someone please PM me? > > Check the format and password list. If you have the hash, exactly as it is shown in the output, it should crack with john pretty quickly. I’ve copied directly out of terminal. Verified the hash type, as well. I ran a test on my own hashed password from the same location, and it too never cracked in either hashcat or John. Which makes me thing there is an issue with the programs themselves, but both doing at the same time seems highly unlikely. I even tried different dictionary lists to no avail.

@z3r05i6n41 said: > I’ve copied directly out of terminal. Verified the hash type, as well. I ran a test on my own hashed password from the same location, and it too never cracked in either hashcat or John. Which makes me thing there is an issue with the programs themselves, but both doing at the same time seems highly unlikely. I even tried different dictionary lists to no avail. That is a touch odd - it took under 4 minutes with John on my VM: Will run 4 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status 0g 0:00:00:35 6.59% (ETA: 21:45:35) 0g/s 30681p/s 30681c/s 30681C/s 653000..652007 XXXXXXXXXXXXXXXXXXXXX (?) 1g 0:00:04:02 DONE (2021-08-10 21:40) 0.004124g/s 30572p/s 30572c/s 30572C/s If you want to PM me your command line I can check if there is anything odd. (and I’ve no idea why markdown appears to have stopped working)

Type your comment> @TazWake said: > If you want to PM me your command line I can check if there is anything odd. > > (and I’ve no idea why markdown appears to have stopped working) I sent you the commands and their outputs

Type your comment> @z3r05i6n41 said:

Type your comment> @TazWake said:

If you want to PM me your command line I can check if there is anything odd.

(and I’ve no idea why markdown appears to have stopped working)

I sent you the commands and their outputs

Cat is good enough for this

the hash is taking too long to crack with rockyou. i know i am not doing anything wrong because the hash of my account was cracked successfully. any nudges or a modified passlist perhaps?

Finally I access user accounts :cold_sweat:

Rooted. The format is strange to me, what John said was right.