![]() ![]() ![]() Scan cannot be run against tcp port 445. Service detection nmap-quick on 10.10.10.237 finished successfully in 1 minute, 1 second There are 2 tasks still running on 10.10.10.237 Service detection nmap-top-20-udp on 10.10.10.237 returned non-zero exit code: 1 Running service detection nmap-quick on 10.10.10.237 Running service detection nmap-top-20-udp on 10.10.10.237 Running service detection nmap-full-tcp on 10.10.10.237 I rated root a 5 for difficulty, as it involved a lot of digging around and a few new tools I’d never used before. I rated User a 4 for difficulty, as the exploit was a little obscure and the hints weren’t explicit enough to not require extensive debugging (not that this is a bad thing, it just makes it harder). ![]() System involved a lot of poking around config files, which again isn’t my favourite challenge, but it is an important skill to have and I learned how to interact with Redis, a common service. Situations like that frustrate me on Hack the Box, but I got there in the end. I liked the concept of this box, but it was super fiddly to execute and find the correct syntax. Root involved finding some passwords in PortableKanban and Redis. Home Comp Sci Writing Blog Hack the Box - Atom ContentsĪtom was an interesting, but at times frustrating, box that involved pushing a malicious update file to an insecure Samba share, which exploited a CVE to get code execution on the box. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |