Okay thank you I will have a look at it.
EDIT: Now it worked, maybe the machine was broken
How do you get any info out of this file?
I tried ghidra but it did not return anything useful. As for the conf file, I donât think this is anything special.
Hello ! I also passed 3 hours on this lol. After reading a previous walk-through, on hack the box you can find something interesting (tips : type advanced search and put âreversingâ in the tag). Remember which programing language is used . Neither ghidra or ida will help you on this (execept to find some strings, but nothing really informative without the other clues).
EDIT : if you donât have HTB âvipâ, try to find how to reverse a program wrote in the specified language (in fact, I think itâs a better way to achieve this task rather than find some usefull stuff on retired machines ^^)
You guys and grills who have solved this, am i on the right track?
0Nv3TwgYjzg********WyuPsyO7193E
Feels like a deep deep hole atm.
encountering that string too, still finding a workaround
Could use a nudge. Found the creds for the **a* user from the special file. This allows for some more enumeration, but it hasnât helped yet. From the posts so far, I assume it should allow me to access the s****** user.
How did you even get that far? I think I have the special file and have it âopenedâ, I have found and interesting bit but canât crack it so to speak.
I need a nudge for root, canât find any working tool for esc
Follow the advice from batche above for the decompiler to read the source. You will discover how the program accesses the box.
Hello, everyone i am unable to access the machine tries to find open port with -Pn options but unable to get open ports⌠Is the machine is suppose to work this way ???
This box does respond to pings. If you canât ping it, ensure you are using your release arena ovpn file.
@pagal1 - I used the US connection, I couldnât get it to work on Europe.
Using connection settings as follows
VPN - US Release Arena
VPN Server - US Release Lab 1
I get a solid ping from my PERSONAL INSTANCE
64 bytes from 10.129.127.19: icmp_seq=50 ttl=127 time=3.69 ms
NMAP gives a full port breakdown as expected.
Hope this helps.
hi, i analysed a file and got a user + password and can login in rpc******.
But i can not connect with evil-winrc. Can someone give me a hint pls. Thanks a lot
Does UserInfo.exe contain any username/password combination?
I have a âpasswordâ, however no username.
am i the only one not being able to spawn the instance? saying there are no available machines
can i dm anyone that has rooted the machine? iâm literally one step away from gaining root flag but iâm running into a problem that i have been searchinf for the solution to it for hours now
Does UserInfo.exe contain any username/password combination?
I have a âpasswordâ, however no username.
I have usernames but no password!
Wanna trade?
Can somebody help with foothoold ? I think I donât enumerate goodâŚ
Just looking for a nudge. Is the user 0x*f on the box? I found it in the UserInfo.exe file.