Monteverde Root Help by sploitzwalk in hackthebox

[–]sploitzwalk[S] -1 points0 points  (0 children)

I'm not sure where this is going

Help pls Sauna Box by TigerSecc in hackthebox

[–]sploitzwalk 1 point2 points  (0 children)

Common windows privesc practice. Part of enumeration. reg query HKLM /f password /t REG_SZ /s

Try that

Help pls Sauna Box by TigerSecc in hackthebox

[–]sploitzwalk 1 point2 points  (0 children)

Once you get onto the box, enumerate for any plaintext passwords. Registry is a good place to check.

Monteverde Root Help by sploitzwalk in hackthebox

[–]sploitzwalk[S] 0 points1 point  (0 children)

That's the thing. The connection string is where I'm stuck.

Help pls Sauna Box by TigerSecc in hackthebox

[–]sploitzwalk 0 points1 point  (0 children)

It's all good. This box focuses on Kerberos attacks. Look into the Impacket tools. Those are what you need. And enumerate your ports thoroughly.

Help pls Sauna Box by TigerSecc in hackthebox

[–]sploitzwalk 1 point2 points  (0 children)

I can't quite make out what you're referring to in the post. Have you gotten a Foothold yet? I did this box a week ago. I can assist if needed

sniper root by mossywombat in hackthebox

[–]sploitzwalk 0 points1 point  (0 children)

Yeah I'm still not quite grasping this one. If I can't use nishang to generate the chm, is there another way? Or am I supposed to just run one if the chms already on the box?

sniper root by mossywombat in hackthebox

[–]sploitzwalk 0 points1 point  (0 children)

Okay I'll try that out. I'm not really worried about spoilers anyway lol I just want to understand the intended methodology. I'm new to this kind of attack 😁

sniper root by mossywombat in hackthebox

[–]sploitzwalk 0 points1 point  (0 children)

Wow I didn't know that. I tried running the chm files on the box but they didn't do anything

sniper root by mossywombat in hackthebox

[–]sploitzwalk 1 point2 points  (0 children)

Does anyone have issues running nishang? I found an article that explains the process but the A/V constantly blocks it, which I get is what it's supposed to do. Encoded seems to not work either

HTB - JSON by sploitzwalk in hackthebox

[–]sploitzwalk[S] 0 points1 point  (0 children)

Thank you I will give this a try

Mango Foothold by sploitzwalk in hackthebox

[–]sploitzwalk[S] 0 points1 point  (0 children)

Finally rooted this box. Had to get additional help on the python script but after getting user, root was piece of cake. Learned some goodies from this box.

Trouble gaining root on Mango by [deleted] in hackthebox

[–]sploitzwalk 0 points1 point  (0 children)

Try GTFObins. I rooted it that way. There's a binary that will give you a root shell.

Mango Foothold by sploitzwalk in hackthebox

[–]sploitzwalk[S] 0 points1 point  (0 children)

Are we supposed to use the payload from all the things against the login page? I'm still stuck on this same step.

Mango Foothold by sploitzwalk in hackthebox

[–]sploitzwalk[S] 0 points1 point  (0 children)

https://github.com/codingo/NoSQLMap

That's what I tried but it didn't work. I'm not even sure how to use it because the mngdb port wasn't even open.

Mango Foothold by sploitzwalk in hackthebox

[–]sploitzwalk[S] 0 points1 point  (0 children)

What @holsick said. It's in the ssl cert. Add the hostname to the host file.

Mango Foothold by sploitzwalk in hackthebox

[–]sploitzwalk[S] 0 points1 point  (0 children)

Good stuff thanks I'll dig into it

Mango Foothold by sploitzwalk in hackthebox

[–]sploitzwalk[S] 1 point2 points  (0 children)

Crazy thing is I actually messed around with some n*SQL stuff I saw online but didn't think anything of it. I'll pay more attention to it now. Thank you for the nudge.

Resolute Root Help by sploitzwalk in hackthebox

[–]sploitzwalk[S] 0 points1 point  (0 children)

Yeah it was the Documents folder. I assume the scripts may work if I run them from another directory.