Official Previse Discussion

When trying to login to the d******* with creds, the shell just hangs forever. Is this normal?

Any nudge on getting root? I’m pretty new to this and I think I’m overthinking it EDIT: Nvm, I was overthinking, found it. Nice machine, rooted

Hey all, need a help. Got the ha** and it takes so much of time to get pwd. Am i on correct track?! pls advise

So I’ve been able to access the vulnerability and get over the foothold, but I can’t seem to get access to user. The e*** portion of l**s seems simple enough, but yet whenever I try to inject into it it’s as if only the first command’s output is recognized? I know what I’m supposed to do and theoretically it should work, but in this specific case it doesn’t and no matter how much I’m able to look up about it I can’t seem to get a solid answer. I’ve tried everything from URL encoding, to changing the content type, etc. Can anyone send me a PM? I know I’m probably missing something potentially very obvious but as of now I’m dumbfounded. EDIT: nevermind, got it fixed. tunnelvision is quite the trickster.

I managed to get user and then root but maybe someone can help me. I got root’s flag in an unconventional way because whenever I got a shell into root, none of my commands except exit worked. It would look something like the following: root@previse:/# ls root@previse:/# I would get no output or anything. What could’ve happened with my shell? :confused:

can someone explain to me why the privesc works if env_reset is set in the sudoers file?

@neuroplastic said: > can someone explain to me why the privesc works if env_reset is set in the sudoers file? It depends how it is set I think. I am not sure and didn’t notice it. This is an interesting read though: UNIX Health Check - Avoid using env_reset in sudoers file

Please help me. I accessed the page and got the m***l password, but I don’t know where to go after that.

*Spoiler Removed*

Type your comment> @neuroplastic said:

can someone explain to me why the privesc works if env_reset is set in the sudoers file?

It doesn’t set. This string is commented in sudoers file.

I got to the files section. I found 3 files and downloaded them then I deleted 2 of them just to see what happens. Seems like the 2 files were non interactive php shells from other user?. I guess I am stupid but I suppose it is not the way to get user normally. Hey guy that I deleted your php backdoor. Sorry was a mistake. Not sure if it works though looks like they are not put in the fs. Hint: To those stuggling with john. I would suggest to crack your own password first, find the proper command line arguments, then crack the one you want, probably will save you time if you have a huge wordlist. @AsaWaffles said: > I managed to get user and then root but maybe someone can help me. I got root’s flag in an unconventional way because whenever I got a shell into root, none of my commands except exit worked. > > It would look something like the following: > root@previse:/# ls > root@previse:/# > > I would get no output or anything. What could’ve happened with my shell? :confused: Depends on how you get the shell. If you don’t use netcat or similar, then probably you don’t see anything cause it is sent to stdout and stdout is sent to a file? try redirecting stdout to stderr as well or use netcat.

Learned something new: Don’t trust Firefox DevTools. I wondered why the length in gob***** was non-zero, but then blindly trusted Firefox which didn’t show anything in the response data. I feel betrayed.

@Joeljp said: > Please help me. > I accessed the page and got the m***l password, but I don’t know where to go after that. Use it to enumerate the m___l service.

I found the way to execute “what I want to do”. But does it is normal that every shell I use don’t work ? I tried to download it (seems to work) , or simply nc , with several archs but nothing.

Type your comment> @UVision said: > I found the way to execute “what I want to do”. But does it is normal that every shell I use don’t work ? I tried to download it (seems to work) , or simply nc , with several archs but nothing. Finally found another (stupid) way.

Hi there, anyone of you reach the final step, where you try to use the copy binary way to privilege escalation. What I don’t understand here is that if I copy the binary to /dev/shm, when executing it, it fails to pop a root shell, but in any other writable directories like /tmp or ~, it works. The copying and executing process is every bit the same. Why is that happening, anything different with /dev/shm? Can’t seem to find an answer by myself, any explanation is appreciated. Thanks.

Fun box! Foothold: can’t really trust browsers these days, you need to look beyond. Find the weak link and abuse it, beware of rabbit holes! User: if you’ve enumerated correctly in the first step you should have the necessary to retrieve good stuff. Be patient and pay attention to the salt! Root: enumerate permissions and exploit the classic misconfiguration Thanks for the box!

Type your comment> @hadrian3689 said: > Rooted! > > A fun box. You learn a lot. > > Hints: > > Foothold: > This box reminded me of Ippsec’s video on the Bank box. You got to talk to the postman AND just cause you can’t see it, it doesn’t mean it’s not happening. > > User: > Just some classic enumeration. If it’s taking too long then you are on the right track. No need to take the salt off the table. > > Root: > What’s today date? Can’t forget to Paint All The Homes > > Hope I didn’t spoil too much. If you didn’t find these helpful, feel free to DM me. Good luck to all. Ippsec’s bank video is a big hint, but very helpful, I don’t think that I would’ve understood foothold at all without it. Thank you!

Very nice machine, just finished. Foothold: as everyone said ippsec have the first para of the solution, once inside the check the zip, not only the config User: Think how the web works and where it stores all the data. Root: Just enumerate, should take 2 minutes. If any nudge is needed just write me :slight_smile:

Rooted I think everything’s been addressed in the comments on this thread (thank you to everyone who shared your information earlier!). If your hash tool’s not working as intended - look at the settings and try something else. The kitty didn’t work for me, need to re-look at my GPU driver, but the other tool worked fine with slight modification. Quick add-on here - please make sure to clean up your stuff! Found a lot remnants from other peoples’ completed efforts that I ended up cleaning up before cleaning up my own stuff. This is an important step that shouldn’t be forgotten about.