BigBang a Linux - Hard Machine
by StingEm - Saturday January 25, 2025 at 03:24 PM
(Jan 27, 2025, 03:12 PM)0xbeef Wrote:
(Jan 27, 2025, 03:01 PM)0xbeef Wrote:
(Jan 27, 2025, 02:40 PM)bkbk Wrote:
(Jan 27, 2025, 02:28 PM)lolla981 Wrote: I need help with the grafana.db hash. I've never cracked a grafana db hash before, x | x | developer | email | name | hash | salt | x and few other strings which could be salts, which one is the actual salt? I use the script to change it into hashcat crackable format but I exhaust my list and it never cracks. I have tried all the three strings that are after the hash as salts separately. Can anybody tell me what I am doing wrong?

https://github.com/iamaldi/grafana2hashcat this worked for me.


Did not work for me too, status shows => exhausted
I guess it's the wrong hash then...

(Jan 27, 2025, 03:11 PM)lolla981 Wrote:
(Jan 27, 2025, 02:36 PM)jamma3131 Wrote:
(Jan 27, 2025, 02:28 PM)lolla981 Wrote: I need help with the grafana.db hash. I've never cracked a grafana db hash before, x | x | developer | email | name | hash | salt | x and few other strings which could be salts, which one is the actual salt? I use the script to change it into hashcat crackable format but I exhaust my list and it never cracks. I have tried all the three strings that are after the hash as salts separately. Can anybody tell me what I am doing wrong?

use john for other user's hash

1|0|admin|admin@localhost||441a715bd788e928170be7954b17cb19de835a2dedfdece8c65327cb1d9ba6bd47d70edb7421b05d9706ba6147cb71973a34|CFn7zMsQpf|CgJll8Bmss||1|1|0||2024-06-05 16:14:51|2024-06-05 16:16:02|0|2024-06-05 16:16:02|0|0|
441a715bd788e928170be7954b17cb19de835a2dedfdece8c65327cb1d9ba6bd47d70edb7421b05d9706ba6147cb71973a34, CFn7zMsQpf > hash.txt ---> like this? or the other string  CgJll8Bmss, I don't understand.

There must be another hash, you did everything right as I did too. But if it's exhausting it means we got the wrong hash. The tool is simple to use. digging for the other hash right now

The admin hash cannot be cracked,
Here is the developer/George's hash 

7e8018a4210efbaeb12f0115580a476fe8f98a4f9bada2720e652654860c59db93577b12201c0151256375d6f883f1b8d960,4umebBJucv

How did you cracked it?

(Jan 26, 2025, 10:01 PM)HTBcracker Wrote: getting root in 1 command

It works thanks dude
Reply
Hidden Content
You must register or login to view this content.

from kali local will give both flags automatically for those who want it. You can also read the python to see how to do the privesc portion if need be.

ensure you have paramiko 'pip install paramiko' and then ensure that blog.bigbang.htb is in your /etc/hosts file

then just run with python3 <script>.py
Reply
FInally i got shell

└─$ nc -lnvp 4444
listening on [any] 4444 ...
connect to [10.10.x.x] from (UNKNOWN) [10.129.204.166] 56708
bash: cannot set terminal process group (1): Inappropriate ioctl for device
bash: no job control in this shell
www-data@bf9a078a3627:/var/www/html/wordpress/wp-admin$

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply
For those still stuck on the foothold
go check for iconv ambionics blogpost.
Don’t over complicate yourself. You need to retrieve 3 informations, /proc/self/maps (you should not have too much pain for this one) and the libc.so.6. But the headers of this one is broken so use the script mentionned before to fix the libc and the exploit will work perfectly fine
Reply
(Jan 27, 2025, 07:12 PM)Taour Wrote: For those still stuck on the foothold
go check for iconv ambionics blogpost.
Don’t over complicate yourself. You need to retrieve 3 informations, /proc/self/maps (you should not have too much pain for this one) and the libc.so.6. But the headers of this one is broken so use the script mentionned before to fix the libc and the exploit will work perfectly fine


for the libc you can just take the one from the docker image of debian:12.4 (docker run -it --rm debian:12.4 run)

strings libc.so.6 | grep "GLIBC 2.36"
GNU C Library (Debian GLIBC 2.36-9+deb12u4) stable release version 2.36.
Reply
that was pretty easy btw !
Reply
(Jan 27, 2025, 07:12 PM)Taour Wrote: For those still stuck on the foothold
go check for iconv ambionics blogpost.
Don’t over complicate yourself. You need to retrieve 3 informations, /proc/self/maps (you should not have too much pain for this one) and the libc.so.6. But the headers of this one is broken so use the script mentionned before to fix the libc and the exploit will work perfectly fine
What about zlib problem?
Reply
can someone provide links to CVEs about this machine foothold?
Reply
How to find parameters to /command or read app.py?

Edit: omg there are more users, ez
Reply
(Jan 27, 2025, 05:44 PM)jamma3131 Wrote:
(Jan 27, 2025, 03:11 PM)lolla981 Wrote:
(Jan 27, 2025, 02:36 PM)jamma3131 Wrote:
(Jan 27, 2025, 02:28 PM)lolla981 Wrote: I need help with the grafana.db hash. I've never cracked a grafana db hash before, x | x | developer | email | name | hash | salt | x and few other strings which could be salts, which one is the actual salt? I use the script to change it into hashcat crackable format but I exhaust my list and it never cracks. I have tried all the three strings that are after the hash as salts separately. Can anybody tell me what I am doing wrong?

use john for other user's hash

1|0|admin|admin@localhost||441a715bd788e928170be7954b17cb19de835a2dedfdece8c65327cb1d9ba6bd47d70edb7421b05d9706ba6147cb71973a34|CFn7zMsQpf|CgJll8Bmss||1|1|0||2024-06-05 16:14:51|2024-06-05 16:16:02|0|2024-06-05 16:16:02|0|0|
441a715bd788e928170be7954b17cb19de835a2dedfdece8c65327cb1d9ba6bd47d70edb7421b05d9706ba6147cb71973a34, CFn7zMsQpf > hash.txt ---> like this? or the other string  CgJll8Bmss, I don't understand.


nah  how did u think all of this is a hash? this is (441a715bd788e928170be7954b17cb19de835a2dedfdece8c65327cb1d9ba6bd47d70edb7421b05d9706ba6147cb71973a34) hash but its salted and even if u crack it the password will not usefull for further invest. i thought u were true way. U cannot find something from this grafana. There is a db u should look more agressions inside box, then think like outside of the box. even Without linpeas u can get first flag.

I got it guys, it was the space that was messing up the converted hash, i got the password lateral movement and then the root
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 4 472 2 hours ago
Last Post: Reminiscing
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 92,110 Yesterday, 06:48 PM
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 2,012 Yesterday, 09:54 AM
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 93,068 Yesterday, 08:48 AM
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,647 Yesterday, 05:08 AM
Last Post: popoler

Forum Jump:


 Users browsing this forum: 1 Guest(s)