HTB - Desires Challenge
by hellme - Friday March 14, 2025 at 02:32 PM
#1
The web application has a vulnerability that allows for uploading tar archives. The exploit works by uploading specially crafted tar files that contain symlinks pointing to session files on the server. By predicting future session IDs through timestamp hashes and overwriting them with fake admin session data, 

However, I'm unable to retrieve the admin session ID. Could there be any specific factors or protections preventing this step from succeeding?
Reply
#2
We were discussing this challenge on another thread. If you want to understand this further I recommend you visit it. (Search for Desire HTB on the forum)

If not here you go.

Link: https://defuse.ca/b/kdNBXbUv Password: DesiresHTB

The times depends on your location and so on. I first did a ping to the server eg:

PING 94.237.53.146 (94.237.53.146) 56(84) bytes of data.
64 bytes from 94.237.53.146: icmp_seq=1 ttl=56 time=35.3 ms

The more accurate the times between easier will be to achieve it, but keep running ping some time util you can get the average time then craft the command like this.

-u http://94.237.53.146:44659 --brute --start 0.035 --end 0.050 --step 0.001 -d 2

It should work and keep trying until the all attempts are failed or the flag is retrieved.
Reply
#3
That one did not work for me , im just wondering what went wrong
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 91 7,537 25 minutes ago
Last Post: ukaugse
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 364 88,788 Yesterday, 07:41 PM
Last Post: napo22
  [FREE] HTB-ProLabs APTLABS Just Flags kewlsunny 23 2,353 03-28-2026, 03:30 AM
Last Post: lulaladrow
  HTB Eloquia User and Root Flags - Insane Box 69646B 13 353 03-27-2026, 06:14 PM
Last Post: vlxw
  HTB - ALL Challenges you Stuck in osamy7593 2 651 03-27-2026, 04:24 PM
Last Post: catsweet



 Users browsing this thread: