Is anyone else having huge difficulties getting their shell to pop? Sometime’s it’s instant, other times it will take up to an hour
Type your comment> @clubby789 said:
Is anyone else having huge difficulties getting their shell to pop? Sometime’s it’s instant, other times it will take up to an hour
Same here… I dont know why.
Spoiler Removed
And rooted. Very interesting box, but needs more testing; shell was impossible to drop half the time, and if someone killed ******.exe then it was a reset
- Initial access: Enumerate the site to understand how the frontend affects the backend. Don’t be afraid to wait a while if it doesn’t work immediately.
- Shell: If a tool doesn’t exist, put it there
- Privesc: Once you find the interesting process, the two stages in it are fairly simple variations of things you should be familiar with.
Pretty good box, but the initial access using the web app is often unresponsive or even takes longer than the stated timeframe
Wasted a lot of time on root because of this:
Hint for root: Once you see the odd thing, forward everything to you. It’s enough to interact with that, no need to see the code.
Hope that helps
Thank you for the box, she is great. Rooted !
Type your comment> @0xskywalker said:
Pretty good box, but the initial access using the web app is often unresponsive or even takes longer than the stated timeframe
+1. Wasted a lot of time because of this. It’s completely unresponsive at the time of writing. My payload worked only 1 time out of 20. And I’m on VIP.
Edit: NVM, I reset the box and got it.
Stuck on the initial foothold. nothing seems to work. i waited , tried different things but still nothing. any hints please?
Rooted ! was very very nice box !!
pretty bad box so far
NOT INSANE…
This box at initial step is sooo slooooooow. Sometimes even restart didint help. Some tips for players: client side, enumerate, bruteforce and half of “answer to life the universe and everything”
If you have a problem with init/user/admin just PM’me. I will try help you
Never mind… I’m just an idiot about being consistent with URLs… /eyeroll
I am chaining vulns for foothold, i can see what can be used for getting shell, but my script not working as i expect.
Edit: if you trying to write your own stuff from the beginning and it is not working, consider using existing things on machine. (not regarding payload, more for vuln structure)
Machine is a bit lagi, so check your testing payloads with already working alongside with them.
PM for hints
Possible that that box is a lil unstable? Figured out how to basic test a response via a normal user. that worked for few attempts. then stopped. after reset not better.
I found a vulnerability in a point but I cannot exploit it maybe because unstable box. I need some indication
Can someone PM me, I need a nudge on the initial shell. I have the RCE through x** vuln, but can’t seem to get anything working for a shell…