I’m not sure this box is “worth” 30 points, but every step toward user was pretty well documented. Technicaly difficult but pretty quick to spot in my opinion.
Root is easy if you’ve done a few windows boxes before, the same tricks apply to bypass the restrictions.
The only thing i really disliked was the password cracking early on. I think the box would’ve been better without this step.
Struggling to get a payload to work with VS* , can dec****, enc****, res*** and Im eating a lot of cereal but just getting error 500 (no saved VS*) back. Is the error 500 to be expected?
I have a shell on the this server as A****d. I have ton a ton of enumeration and I have a usable C# P********l alternative uploaded and working but I am struggling with the privesc. I got a few of the enumeration scripts to run, too, and I have failed to see anything of use. Is anybody working on this that wants to team up or can somebody give me a nudge?
Struggling to get a payload to work with VS* , can dec****, enc****, res*** and Im eating a lot of cereal but just getting error 500 (no saved VS*) back. Is the error 500 to be expected?
Hi can someone help to get a reverse shell on this box? I have decrypted the A*****.zip file found the vist secret but when I use yso**** I get userSubscribe.faces - No saved view state could be found for the view identifier.
hello - need a nudge with this box. I have user.txt and have also found an image with user:password. not sure how to progress to root and would apreciate a nudge
So, I got root, the easy way (still can’t believe that worked). Took my hash, looked up some write ups, & now I want to be able to get root the right way (popping a shell). I got a meterpreter shell (even tho I don’t really need it) that was nice for me to learn (the evasion method), but still unable to bs u** with c. One of the files, in the write up, isn’t online anymore. Any Guru’s wanna show me a thing or two? About C**** U** B*****?