Remote

Finally rooted. My first machine owned on HTB. Learn a lot. :wink:

I’m pretty new to this, working on Remote. So far, I’ve gotten the user flag.

As of now, I think I’ve managed to pull TV credentials, but can’t figure out how to use the ā– ā– ā– ā– ā– ā–  things.

I feel like I’m pretty close on this. I can’t figure out how to escalate from this point with the credentials I’ve got (or think I’ve got). If someone’s done this with the TV method and wouldn’t mind shooting me a DM with a nudge in the right direction, or so that I can provide slightly more specific information for a nudge to get this sucker.

Type your comment> @Jatius said:

I’m pretty new to this, working on Remote. So far, I’ve gotten the user flag.

As of now, I think I’ve managed to pull TV credentials, but can’t figure out how to use the ā– ā– ā– ā– ā– ā–  things.

I feel like I’m pretty close on this. I can’t figure out how to escalate from this point with the credentials I’ve got (or think I’ve got). If someone’s done this with the TV method and wouldn’t mind shooting me a DM with a nudge in the right direction, or so that I can provide slightly more specific information for a nudge to get this sucker.

Same here…

Got user , Upgraded my shell so i could invoke some better PS for enumerations
Found the TV, read the article and which led me to the exploit, found the thing they left unattended

At the moment, trying to replay the creds using a common powershell command but my my reverse gets terminated every-time… maybe AV? tried using a PS reverse shell to avoid AV but that doesn’t fire off for some reason …

Got root with the musical number after deciding to throw in the towel with the remote. However, I’d like to know how to do the remote way, if anyone who’s done that wants to DM me with nudge/hint/whatever from where I am, I’d appreciate it.

Spoiler Removed

Hey got root on the box. Can someone tell me what is the other way?
Thanks in advance

Hello, I have a shell as user and currently I see something that I can ā€œabuseā€ to to PrivEscalation by I*****-S**********e , but nothing I’m trying works. Tried different listeing ports, versions, etc,. Anyone that can help me out please? Thanks.

I got user, but my reverse shell don’t allow me to execute P****U**.ps1… anyone can help me to get root?

C:\Windows\system32>whoami
whoami
nt authority\system

C:\Windows\system32>systeminfo
systeminfo

Host Name: REMOTE

Finally.

Got root, but it looks like through the unintended way. I found credentials for the intended way and am working on applying them. DM for nudges.

Can someone help on this box. Nudge pls.

I got root. Someone else have a problem with the shells down all the f***n’ time?

Can someone please message me to help me with root, i know the permissions that i need to exploit but i need help.

Update

I was able to figure it out, basic enum will give you two directions to go into. I am more of a team player tho :slight_smile:

Finally rooted!

Enjoyable box don’t think to hard about the Priv Esc.
DM if you need any help

NVM

Okay, so i got in with creds ( 1 set) and able to do whatever on the backend with the site. Now i have found the version # and a exploit however I am trying to get it to work and having some major issues since there is no ā€œthis is the syntaxā€ for this exploit and it keeps erroring out when i try a help page. Could someone DM me and see if I am using the correct one? Or be able to assist with the correct syntax?

Thanks!

Shout out to absolutenoob 1 and Nism0 for reaching out. Was able to get the respective scripts working, was just a little newb on seeing what was right in front of me.

User hash gotten
Root – not so much, and lost my session lol

Well, it’s reached the point where it’s no fun anymore I’m afraid… :frowning:
I got the creds, and I’m able to ping myself through the particular exploit.
Yet, no matter what changes I do to get a RV, I always get either nothing or a syntax error (relatively to the million of double and single quotes I guess).
Would someone be kind enough to tell me what I should do from there ? Windows syntax is weird and unknown to me and I think that might be the reason I’ve been struggling for a while now.

I know it may sounds bad but can anyone point me in the right direction for user. I am trawling though the share and umbraco files. Not found much till now apart from the portal and a user called s****h. No password that I can see through

Finally got root on this one…i could not get the U** S** route to work though. The alternative route is a great enum and research option. Learned quite a bit working on this one! Much thanks, @mrb3n

C:\Windows\system32>whoami
nt authority\system
C:\Windows\system32>systeminfo
Host Name: REMOTE