Stuck at reverse shell for days can someone gimme a nudge.
This tool will help you https://forum.hackthebox.com/t/official-redpanda-discussion/261025/164?u=f1r3b0x.
Itâs also important to know that sometimes stars are more useful than dollars ($).
anyone know how to get the revshell? i try many payload but keep failed
Finally pwned.
The xxe was not easy to understand at first glance.
Thanks all for the tips that can be found in this thread!
Do you mind if I DM you? Iâm stuck and honestly donât know what to do anymore
No problem mate!
FinallyâŚRooted!
WowâŚWhen you get the user flag and youâre likeâŚâeasyâ and then the root flagâŚDifficulty is not comparable , but in the end, a great and fun machine, learned a lot of new things!
If anyone needs help, just DM. I wonât give you any answersâŚbut tips :).
One tipâŚtry it out on your local machine firstâŚ
And also if anyone wants to talk about there solution over discord, would love to, I wonder if the way I got it was way over thoughtâŚ
root:$6$HYdGmG45Ye119KMJ$XKsSsâŚ9:7:::
Nice machine, easy foothold/user, medium root - all the nudges here in the topic already, it still needs some trial and error until you can pull off the root
âfake it till you make itâ but fake it right
BTW
although it is not the intended way but anyone tried this?
Can someone help me with getting a reverse shell?
I had an interesting scenario with this where /stats never updated. No matter what I did. Donât know why that is, and it did make things a little harder to figure out. In the also process of priv esc I think I also figured out why this feature wasnât working.
As others have said, difference in difficulty between user and root is a lot. So donât feel bad if you get stuck on root. Definitely not an Easy box when it comes to priv esc. Getting root took me a few days and was not easy. But I learned a lot and found some new useful tools. Thanks to @ZuZu for the help All the hints you should need are already in this thread, and if youâre still stumped just DM someone.
Just go user flag.
I think the vulnerability wasnât that hard to figure out if you follow some basic fuzzing guidelines.
I got code execution with response on the site but didnât succeed in getting a shell just yet.
Currently reading trough the docs of the github repo posted here.
Happy hacking my friends
Maybe this thread is holding too much spoilers imo
Rooted! Pulled out some hair while getting reverse shell, but it was worth it⌠very interesting privesc!!! PM me if you need a help
Has anyone had issues with get a reverse shell to connect to the listener?
I have the reverse shell loaded succefully and can see it actually loaded. however when i run it nothing happens. ive tryed python, bash, and .elf. nothing worksâŚ
Ive also looked for any human errors or wrong ips and ports but all looks good.
I got a shell yesterday after some trial and error. Im far from an expert in the field of this type of exploitation but i would be glad to try and help you out. Dm me and show me what you tried
Absolutely lost on the privesc. From looking at the thread Iâm seeing things about XXE, but Iâm completely lost as to where you would do that, and why would that be a solution. Iâd like to PM someone if I can.