@w4nd3r said:
I had a feeling you could get in through www-data… I dropped it and found the intended method. I would love to come back and learn that someday though.
Still stuck here with www-data and neither can move ahead nor behind…
Any idea where to start to look? What’s this “Intended Method”!
@w4nd3r said:
I had a feeling you could get in through www-data… I dropped it and found the intended method. I would love to come back and learn that someday though.
Still stuck here with www-data and neither can move ahead nor behind…
Any idea where to start to look? What’s this “Intended Method”!
the Goal clear anyhow get a root flag. all way are correct but only one condition is anyhow u ll managed the root access…
enumerate system …and also take a look of exploitdb priv esc section…
@w4nd3r said:
I had a feeling you could get in through www-data… I dropped it and found the intended method. I would love to come back and learn that someday though.
Still stuck here with www-data and neither can move ahead nor behind…
Any idea where to start to look? What’s this “Intended Method”!
the Goal clear anyhow get a root flag. all way are correct but only one condition is anyhow u ll managed the root access…
enumerate system …and also take a look of exploitdb priv esc section…
Got it. It was right infront of my eyes the whole time. Thanks @Agent22
Did anyone else get the issue ‘Failure copying from /proc/self/cmdline’ when exploiting proftpd? I can’t find anything on google that resolves this issue. I am running as root too.
Okay, this box is extremely easy. However, it is a box that can cause some serious overthinking. This box does not require exploitation nor does it require a shell to be uploaded. Everything you need is there for the taking. In a way, it’s an information jigsaw puzzle.
Think information reuse.
When it comes to priv-esc, think what you would normally do on your machine running Linux.
As I scroll through the forum and look at the posts in this thread I see lots of www-data is a no-go
A question spawns in my head… Do I need to be local inside the system?
Or is this intended method a remote exploit?
@PinkPanther said:
As I scroll through the forum and look at the posts in this thread I see lots of www-data is a no-go
A question spawns in my head… Do I need to be local inside the system?
Or is this intended method a remote exploit?
Refer to my post.
If someone has a complex password, what are they likely to do? Where would you find valid usernames on this web application that can be tried on a secure administration protocol? How would you go about elevating privilages on your own system?
man I feel really stupid… I cant figure it out Ive had www-data shell for 3 days now and ive tried tons of RCE’s and enum of privs ive even tried local exploits xD they usually end in kernel panic ive been staring at this minecraft folder for days as well but I know nothing about minecraft can anyone shape my mind in the right direction im dying ;-;
Help please, I am stuck can some please give me a pointer I can see the user.txt but can’t cat it, I can see the Minecraft folder, I have only been hacking a year and could really do with just pointing in the right direction, share the love fellow H4C3R5
To get in as www-data is easy. With the password obtained from the .jar file you can login to phpmyadmin and change or crack notch password. Then you can use metasploit (exploit/unix/webapp/wp_admin_shell_upload exploit) to upload a php-shell as www-data.