Jun 09, 2024, 02:35 AM
Is clearml-init with new keys from admin panel any help towards root?
|
HTB - Blurry
by black_panther - Saturday June 8, 2024 at 06:30 PM
|
|
Jun 09, 2024, 02:35 AM
Is clearml-init with new keys from admin panel any help towards root?
Jun 09, 2024, 02:44 AM
Guys any something hint for user LOL?
This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Jun 09, 2024, 03:11 AM
root:
sudo -l
for root --
import torch
what is this error ?
import torch$ python3 evil.py
Jun 09, 2024, 04:46 AM
For root you can also just take the .pkl you created to get user and replace the one in the demo.
No need to really create something custom with torch.
Jun 09, 2024, 04:53 AM
(Jun 09, 2024, 04:46 AM)ritualist Wrote: For root you can also just take the .pkl you created to get user and replace the one in the demo. Ive been trying to get root for a while, I execute my malicious pth and the shell that i get is still user. When i try to sudo evaluate_model, I get asked for a password but i did not locate the password anywhere for the user. What am I msising?
Jun 09, 2024, 04:59 AM
(Jun 09, 2024, 04:53 AM)testermoment Wrote:(Jun 09, 2024, 04:46 AM)ritualist Wrote: For root you can also just take the .pkl you created to get user and replace the one in the demo. Make sure to call it exactly as sudo -l says, it will not need a password. E.g. sudo /usr/bin/evaluate_model /models/*.pthsudo /usr/bin/evaluate_model /models/mymodel.pth
Jun 09, 2024, 06:09 AM
(Jun 09, 2024, 05:35 AM)3kyy Wrote: Payload exploit.py Can you please tell me where do you need to enter that payload? I'm cloning one of the training models and editing it and putting the pyload in uncommited changes, but it's not triggering after adding it in queue
Jun 09, 2024, 09:12 AM
(Jun 09, 2024, 09:04 AM)wh1t3_r4bb1t Wrote:(Jun 09, 2024, 06:09 AM)Szakyro Wrote:(Jun 09, 2024, 05:35 AM)3kyy Wrote: Payload exploit.py The strange thing is that I did that, and I have netcat listening on the port specified in it, but for some reason no connection is coming to netcat, and no revshell is triggered. That's why I was still asking... |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] HackTheBox Dante - complete writeup written by Tamarisk | 602 | 91,778 |
8 hours ago Last Post: sabero_exe |
||
| [FREE] CPTS 12 FLAGS | 68 | 1,968 |
Yesterday, 09:54 AM Last Post: VictorPipeau |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 371 | 92,976 |
Yesterday, 08:48 AM Last Post: phannguyenbaouy1 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 21 | 2,627 |
Yesterday, 05:08 AM Last Post: popoler |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,275 |
Apr 30, 2026, 02:10 PM Last Post: kkkato |
||