Wall

hmm

still stuck at the c******* login page. i am very new to this whole hack the box thing, but i was able to find the c******* page :smiley:
any hints??

Finally got root! 90% of the work on this box for me was getting the initial shell, I did learn a lot to get it to work though so its all good. Went straight from initial shell to root, which was very easy.

Some tips:

  • Once you’ve found some webpages, try a few different METHODS to get them to tell you something
  • Once you have found somewhere to login, an exploit (with some modification) might help you find the credentials
  • Regarding getting the exploit to work, I found it helpful to make the script print out its responses, that way you can tell when the exploit has failed, it wont tell you otherwise.
  • Also regarding the exploit, using the UI helped me find out what what characters I couldn’t use, it returns 403.
  • There is also a way to see the output of your commands, see the third point above.

Hopefully these tips can help, and are not too revealing. PM me if you need any help.

Only been able to get netcat to connect back so far, but nothing interactive, and definitely no reverse shell. Frustrating, but fun nonetheless.
Escaping the forbidden chars and command calls isn’t hard once you get it, but getting around/through the wall stays problematic for now.

Rooted! Annoying but fun box!

Rooted
Fun and good machine.

Got shell as ww*-****… I know a path to root… but it will take a loong time :frowning:

Still enumerating to find a way to get root faster. Any clues? :slight_smile:

I’ve also got the ww**** shell, i’ve done the enum but i cannot see nothing out of ordinary, any hint ?

Oh nvm… Got it.

Pay attention on the linenum output. :smiley:

So, I barely got anything out of gobuster besides /s*-s* and /m*. I got the a*.php and p*.php guessing from your comments…
Could someone hit me up to give me tips for better enums?
I’m kinda super fucking lost in this box

Can somebody help me with getting the shell? I got it already yesterday, but now it is not working anymore.

Hey guys, I have the exploit for c******* and everything I need but I am stuck. Please, please DM me for further information!

Type your comment> @BinaryStrike said:

I’ve also got the ww**** shell, i’ve done the enum but i cannot see nothing out of ordinary, any hint ?

Try to find any privesc based on permissions, or abuse with some executable made by root in any directory…

Just by using basic enumeration commands you will break the wall

Got it, thanks for the machine @askar !

Rooted, from w**-a to root, I need to know how I can do it from w-a then shy user then root, I got shy user creds but how I can go for root without sc* exploit.

Please anyone have an Idea PM.

Guys can someone please help me with the c******* exploit. At the end, it says "Check your netcat listener " but I don’t get any shell.
Can someone PM me please
thanks

I modified the script and have the login creds, but am struggling with the payload for the next stage. Could someone please dm me a hint?

Edit: nevermind figured it out. Have www-data :mrgreen:

I think exploit script is working, you need special payload instead ncat…

I need some help with privesc. I have ww***** shell and enum but can see the way to continue with it… PM me a hint please

Restart M… Eng,… after every try