Official Support Discussion

Okay thank you I will have a look at it.
EDIT: Now it worked, maybe the machine was broken

How do you get any info out of this file?

I tried ghidra but it did not return anything useful. As for the conf file, I don’t think this is anything special.

Hello ! I also passed 3 hours on this lol. After reading a previous walk-through, on hack the box you can find something interesting (tips : type advanced search and put “reversing” in the tag). Remember which programing language is used :slight_smile: . Neither ghidra or ida will help you on this (execept to find some strings, but nothing really informative without the other clues).

EDIT : if you don’t have HTB “vip”, try to find how to reverse a program wrote in the specified language (in fact, I think it’s a better way to achieve this task rather than find some usefull stuff on retired machines ^^)

You guys and grills who have solved this, am i on the right track?

0Nv3TwgYjzg********WyuPsyO7193E

Feels like a deep deep hole atm.

encountering that string too, still finding a workaround

Could use a nudge. Found the creds for the **a* user from the special file. This allows for some more enumeration, but it hasn’t helped yet. From the posts so far, I assume it should allow me to access the s****** user.

How did you even get that far? I think I have the special file and have it ‘opened’, I have found and interesting bit but can’t crack it so to speak.

I need a nudge for root, can’t find any working tool for esc

Follow the advice from batche above for the decompiler to read the source. You will discover how the program accesses the box.

Hello, everyone i am unable to access the machine tries to find open port with -Pn options but unable to get open ports… Is the machine is suppose to work this way ???

This box does respond to pings. If you can’t ping it, ensure you are using your release arena ovpn file.

1 Like

@pagal1 - I used the US connection, I couldn’t get it to work on Europe.

1 Like

Using connection settings as follows

VPN - US Release Arena
VPN Server - US Release Lab 1

I get a solid ping from my PERSONAL INSTANCE

64 bytes from 10.129.127.19: icmp_seq=50 ttl=127 time=3.69 ms

NMAP gives a full port breakdown as expected.

Hope this helps.

hi, i analysed a file and got a user + password and can login in rpc******.
But i can not connect with evil-winrc. Can someone give me a hint pls. Thanks a lot

Does UserInfo.exe contain any username/password combination?

I have a “password”, however no username.

am i the only one not being able to spawn the instance? saying there are no available machines

can i dm anyone that has rooted the machine? i’m literally one step away from gaining root flag but i’m running into a problem that i have been searchinf for the solution to it for hours now

Does UserInfo.exe contain any username/password combination?

I have a “password”, however no username.

I have usernames but no password!

:rofl:

Wanna trade? :sunglasses:

Can somebody help with foothoold ? I think I don’t enumerate good…

Just looking for a nudge. Is the user 0x*f on the box? I found it in the UserInfo.exe file.