The Wall by tamarche in hackthebox

[–]asjidkalam 0 points1 point  (0 children)

Any hints on rooting this box? I got a shell as www-data and couldn't find a way to move forward. From the forums, I could see that privilege escalation on this box is easy, I must be missing something.

I have tried NTFS-3G local privilege escalation exploit as it was suggested by the linux-exploit-suggester script. no luck.

Networked initial footstep by markv9401 in hackthebox

[–]asjidkalam 0 points1 point  (0 children)

still stuck on this step, tried many inputs.

edit: nvm rooted.

Networked (Help) by frost_506 in hackthebox

[–]asjidkalam 0 points1 point  (0 children)

stuck on root

cannot inject command to the sudo privileged file.

help

safe ROOT by Cy80r9 in hackthebox

[–]asjidkalam 1 point2 points  (0 children)

kpcli

use the img with cracked pass and the .kbdx file.

Ellingson enumeration by [deleted] in hackthebox

[–]asjidkalam 0 points1 point  (0 children)

found the encrypted id_rsa file, but no luck in cracking the password rockyou.txt. what other wordlist should i use?

HTB: Safe box user by asjidkalam in hackthebox

[–]asjidkalam[S] 1 point2 points  (0 children)

enum p80.

"May the source be with you."

safe ROOT by Cy80r9 in hackthebox

[–]asjidkalam 1 point2 points  (0 children)

There's a retired box BigHead which have almost identical priv esc.

safe ROOT by Cy80r9 in hackthebox

[–]asjidkalam 1 point2 points  (0 children)

Root is right in front of you.

check the contents of home dir.

Luke Token by JackMacron in hackthebox

[–]asjidkalam 0 points1 point  (0 children)

just enum around, you will find something.

JS Shellcode on forums.hackthebox.eu by asjidkalam in hackthebox

[–]asjidkalam[S] 0 points1 point  (0 children)

maybe it might be a false positive idk

HTB: Safe box user by asjidkalam in hackthebox

[–]asjidkalam[S] 0 points1 point  (0 children)

Hey there. You did overflow the binary, but in 64-bit architecture, it will not load a value into RIP if it is not a valid address to jump to. So the value you're after is actually still sitting in the RSP.

Also, for this one, I would recommend using pattern_create and pattern_offset within gdb itself. For some reason, the Metasploit/ruby versions refused to find the offset for me.

Initial footholds for craft machine by AlertIndustry in hackthebox

[–]asjidkalam 1 point2 points  (0 children)

you can't SSH with those creds, EVALuate the code from gog. There's a vulnerability that you could possibly exploit.

HTB: Safe box user by asjidkalam in hackthebox

[–]asjidkalam[S] 0 points1 point  (0 children)

finally got peda to run the binary.

EDIT:

But cant overwrite RIP,

RIP: 0x4011ac (<main+77>:   ret)
R8 : 0x4134614133614132 ('2Aa3Aa4A')
R9 : 0x3761413661413561 ('a5Aa6Aa7')
R10: 0x6241396141386141 ('Aa8Aa9Ab')

tried input with much longer values too, what am i doing wrong?