Finally rooted. My first machine owned on HTB. Learn a lot.
Iām pretty new to this, working on Remote. So far, Iāve gotten the user flag.
As of now, I think Iāve managed to pull TV credentials, but canāt figure out how to use the ā ā ā ā ā ā things.
I feel like Iām pretty close on this. I canāt figure out how to escalate from this point with the credentials Iāve got (or think Iāve got). If someoneās done this with the TV method and wouldnāt mind shooting me a DM with a nudge in the right direction, or so that I can provide slightly more specific information for a nudge to get this sucker.
Type your comment> @Jatius said:
Iām pretty new to this, working on Remote. So far, Iāve gotten the user flag.
As of now, I think Iāve managed to pull TV credentials, but canāt figure out how to use the ā ā ā ā ā ā things.
I feel like Iām pretty close on this. I canāt figure out how to escalate from this point with the credentials Iāve got (or think Iāve got). If someoneās done this with the TV method and wouldnāt mind shooting me a DM with a nudge in the right direction, or so that I can provide slightly more specific information for a nudge to get this sucker.
Same hereā¦
Got user , Upgraded my shell so i could invoke some better PS for enumerations
Found the TV, read the article and which led me to the exploit, found the thing they left unattended
At the moment, trying to replay the creds using a common powershell command but my my reverse gets terminated every-time⦠maybe AV? tried using a PS reverse shell to avoid AV but that doesnāt fire off for some reason ā¦
Got root with the musical number after deciding to throw in the towel with the remote. However, Iād like to know how to do the remote way, if anyone whoās done that wants to DM me with nudge/hint/whatever from where I am, Iād appreciate it.
Spoiler Removed
Hey got root on the box. Can someone tell me what is the other way?
Thanks in advance
Hello, I have a shell as user and currently I see something that I can āabuseā to to PrivEscalation by I*****-S**********e , but nothing Iām trying works. Tried different listeing ports, versions, etc,. Anyone that can help me out please? Thanks.
I got user, but my reverse shell donāt allow me to execute P****U**.ps1⦠anyone can help me to get root?
C:\Windows\system32>whoami
whoami
nt authority\system
C:\Windows\system32>systeminfo
systeminfo
Host Name: REMOTE
Finally.
Got root, but it looks like through the unintended way. I found credentials for the intended way and am working on applying them. DM for nudges.
Can someone help on this box. Nudge pls.
I got root. Someone else have a problem with the shells down all the f***nā time?
Can someone please message me to help me with root, i know the permissions that i need to exploit but i need help.
Update
I was able to figure it out, basic enum will give you two directions to go into. I am more of a team player tho
Finally rooted!
Enjoyable box donāt think to hard about the Priv Esc.
DM if you need any help
NVM
Okay, so i got in with creds ( 1 set) and able to do whatever on the backend with the site. Now i have found the version # and a exploit however I am trying to get it to work and having some major issues since there is no āthis is the syntaxā for this exploit and it keeps erroring out when i try a help page. Could someone DM me and see if I am using the correct one? Or be able to assist with the correct syntax?
Thanks!
Shout out to absolutenoob 1 and Nism0 for reaching out. Was able to get the respective scripts working, was just a little newb on seeing what was right in front of me.
User hash gotten
Root ā not so much, and lost my session lol
Well, itās reached the point where itās no fun anymore Iām afraidā¦
I got the creds, and Iām able to ping myself through the particular exploit.
Yet, no matter what changes I do to get a RV, I always get either nothing or a syntax error (relatively to the million of double and single quotes I guess).
Would someone be kind enough to tell me what I should do from there ? Windows syntax is weird and unknown to me and I think that might be the reason Iāve been struggling for a while now.
I know it may sounds bad but can anyone point me in the right direction for user. I am trawling though the share and umbraco files. Not found much till now apart from the portal and a user called s****h. No password that I can see through
Finally got root on this oneā¦i could not get the U** S** route to work though. The alternative route is a great enum and research option. Learned quite a bit working on this one! Much thanks, @mrb3n
C:\Windows\system32>whoami
nt authority\system
C:\Windows\system32>systeminfo
Host Name: REMOTE