@td00k said:
For the ones that are stucked on that crazy b***up file, I recommend to take a look on the OverTheWire – Bandit, level 12. Hope that isn’t too much spoil
^^^^^This helped me feel better that I wasn’t chasing down a rabbit hole.
@d4ydr34mer said:
Ooof…need a hint for root. I see the input/output files. I even see the exact commands running as root that update them, but I can’t figure out what to do from there. I don’t have access to any of these files…
In the command what are the parameters used for? Check the man pages
@Rhaihi said:
I’am trying to upload a shell but I keep getting the message: “File not safe”, I have adjusted the settings so that the shell is accepted but still cant upload… how can I bypass this “File is not safe” message?
Joomla has a built-in mechanism to upload bundles of PHP files.
This was an easy one. Usually it takes me days to get both flags but this time it was a matter of minutes. I think this box will be awesome for starters in the Linux pentesting.
Is the machine unstable on the Free Server? I am getting this almost every time I am working on the machine.
"WARNING: Failed to daemonise. This is quite common and not fatal. Connection refused (111) "
@Draco123 said:
Is the machine unstable on the Free Server? I am getting this almost every time I am working on the machine.
"WARNING: Failed to daemonise. This is quite common and not fatal. Connection refused (111) "
As a few people have stated before, there’s one method of getting code execution which involves overwriting the default page. That particular route of getting RCE is what’s causing the error you’re seeing.
Help anyone please.
I managed to get a reverse shell then decrypted that p******* file too. got some data but then stuck. No idea what to do and how to use it to read user.txt.