Ok, I’ve spent 3 days trying to get a fully working meterpreter payload from the “o” service. I’ve even tested it on my local Windows machine…still only getting half connections. Do you have to use some crazy “obfuscation” technique? Can someone PM me with a clue? I’m losing my mind
@meowmix187 said:
Ok, I’ve spent 3 days trying to get a fully working meterpreter payload from the “o” service. I’ve even tested it on my local Windows machine…still only getting half connections. Do you have to use some crazy “obfuscation” technique? Can someone PM me with a clue? I’m losing my mind
Try a cleaner payload of getting access (remember Arch). Once you’re in, start enough backup shells. As mentioned before, it may be tricky relaunching a shell without resetting.
@hendrikvb said:
Here’s a good nudge… If you know which parameter to abuse but the tool you use takes ages to get to it, hit Ctrl-C and skip the current parameter until you reach the one you need.
Best hint on here…
Is this an automation in background to exploit… or is this with that service? Sometimes it looks like things are ‘handled’, other times they just sit there.
Scrap that… AHHH… OK, get it - moving on up
I hope that’s not a rabbit hole >_< xD
Anybody can help me?I find some hashes/user,find document on some service,but cant exploit it,cant take a shell,even dont hear a ping from rabbit.
I really wish I’d never looked at this box - enumerating it now and I can see why it is called rabbit…
I know what you mean… I thought I was making progress and slap, straight back down a new hole.
Well i think i need a push here … I’m able to login but still trying to find a way to upload something .
@Bear said:
@hendrikvb said:
Here’s a good nudge… If you know which parameter to abuse but the tool you use takes ages to get to it, hit Ctrl-C and skip the current parameter until you reach the one you need.Best hint on here…
Perhaps the tool has an option to only target a specific parameter?
Can i PM anybody about some exploit in some web application?
I’ve found 2 users, but I’m stuck now. I did enumeration for all ports, nikto, gobuster, checking every port and SW. I have been trying different payloads with no luck. Could someone PM me with a hint please?
Someone PM please i wanna ask something about gobuster/dirbuster
I finally got the box. This was tough box, learned a lot. Thanks for the nudge @devloop :). All I can say that without spoil the box is enumerate it carefully. Entry point is not that hard once you figure out what to look for. Those who find the way to get in for priv-esc is not that hard either I was overthinking to much I have learned this hard way . Good luck again thanks for the box.
a bit clueless as to how to process once you are able to log in to o**
there is one processing application, found one relevant exploit for it, some how not able to get a reverse shell back… PMs are welcome
@pzylence said:
a bit clueless as to how to process once you are able to log in to o**
there is one processing application, found one relevant exploit for it, some how not able to get a reverse shell back… PMs are welcome
At the same point here. The guidance so far in this thread is to reset and give the box 7 minutes to run your payload. I know what software is running and, given a particular payload, can even sometimes see a hash thrown my way so I also know the user.
My best guess is you have to be somewhat lucky so just keep trying…
Can someone tell me if I’m wrong or missing something? I have the creds to login, I have User: Ari*** Passwd: Puss********* and other 7 cracked hashes out of 10. Then I go to port 80, service /OW****** and try metasploit modules to login… and nothing. Then I try the NTLM login at port 80 /OA******* and NONE of the creds work, am I missing something? It makes nosense, thank you
Wascally wabbit, I got you now! I learned 99 ways not to exploit this box… hopefully one of those come in handy on another machine. Thanks @lkys37en for the challenge, and good luck to others!
@bobthebuilder said:
@Bear said:
@hendrikvb said:
Here’s a good nudge… If you know which parameter to abuse but the tool you use takes ages to get to it, hit Ctrl-C and skip the current parameter until you reach the one you need.Best hint on here…
Perhaps the tool has an option to only target a specific parameter?
But that’d mean learning something new
Perhaps but did you know about the Ctrl-C approach?