I’m running into “Invalid format” error when I tried to ssh in with certain given “authorized_keys”. I do see the message of “I guess things can be configured better” but I’m pretty lost as for what to do. Any hint will be much appreciated!
and someone had the brilliant idea of deleting files. I get back to this box after getting the user flag two days ago (yes i’m taking my time) and get to see people are accessing this and deleting file s forcing others to reset it.
I’ve seen this message being repeated too many times by people engaged here but I guess some of it needs to be constantly repeated: most HTB boxes do not require any BRUTEFORCING, anything you do like deleting files affects other people’s experience here. PLEASE be mindful and considerate with others, just like we ALL need to be while dealing with the Coronavirus (separate issue).
first time posting a comment here.
really fun and unique machine, enjoyed everything apart from the fact that it is unresponsive at times due to people bruteforcing.
here are some of my hints.
FOOTHOLD: google the hint given by the box creator and try everything you have found.
USER: enumerate, read the files, know your powers and what they can do.
why must people constantly reset the box? Nothing is missing, I can assure you. How about you test your stuff locally before assuming the box is incorrect?
Be patient Guys !
This is just an easy machine, so Resetting and deleting files is expected by script kiddies !
There is a lot of traffic in this box, stay calm and be patient
Anyway all hints are available
User: How to assign a permission to someone in Linux, Someone is already assigned !
Root: Catch the automation and inject in certain time !
rooted yesterday. but not without help. main problem was that I got sidetracked by scripts made by other users. Sadly I realized way too late that those files are not supposed to be there
Anyway: really great box. taught me new things. thats the most important thing. Thank you @Xh4H
Init foothold: read everything you an access and then google
user: look at what you can access/run and if someone left notes behind
root: look at whats going on and look for something you can wirte to