Type your comment> @CosmicBear said:
Type your comment> @0xjb said:
(Quote)
“ I’m BLUE da ba dee da ba” ?
Oh ffs, didn’t even think of that ??
Thanks
Type your comment> @CosmicBear said:
Type your comment> @0xjb said:
(Quote)
“ I’m BLUE da ba dee da ba” ?
Oh ffs, didn’t even think of that ??
Thanks
Type your comment> @x80cbc said:
Did you guys have any issue with wp plugins page? Seems to be broken to me.
"Warning: An unexpected error occurred. Something may be wrong with WordPress.org or this server’s configuration. If you continue to have problems, please try the support forums. (WordPress could not establish a secure connection to WordPress.org. Please contact your server administrator.) in /var/www/html/wordpress/wp-admin/includes/plugin-install.php on line 182"
UPDATE: Nevermind… someone restarted the machine and I was able to get in.
I have the same problem, can someone help please?
Type your comment> @McNinjaSovs said:
Have been stuck on NIX02 after I got the user flag some days ago… I feel like I have tried everything, but I’m clearly missing something… Anyone that can help me?
Don’t know which user you are but search for specific data in their directories. There will also be a executable file standing out to you in your enumeration. Try to find what this file does and whether/how you can leverage it to escalate.
nevermind
Hi,
Having problem with jenkins. Dirb did not find anything, password spray did not find any creds. Is it something else I’m missing ? Unless my dictionary lists are rubbish
Type your comment> @ar2r777 said:
Hi,
Having problem with jenkins. Dirb did not find anything, password spray did not find any creds. Is it something else I’m missing ? Unless my dictionary lists are rubbish
Remember that some boxes have dependencies from other boxes. So maybe there are no path before you root some other machine. If you are stuck try move on to another box.
Type your comment> @0xjb said:
Could I get a nudge on the second pivot please? I have addr but can’t figure out what I need to do to access it
Look at the hostnames of the boxes on Dante description page and think how they could be connected.
Type your comment> @Ric0 said:
Hi, I have been struggling with O***** M***** R***** S**** to upload correctly obfuscated php shell in jpg. Trying to fix a script found on exploit-db. Appreciate any nudges. Or … this is rabbit hole
I found the same exploit on another website which did not need to be modified
Type your comment> @rakeshm90 said:
Type your comment> @Ric0 said:
Hi, I have been struggling with O***** M***** R***** S**** to upload correctly obfuscated php shell in jpg. Trying to fix a script found on exploit-db. Appreciate any nudges. Or … this is rabbit hole
I found the same exploit on another website which did not need to be modified
Done it manually. Good exercise. Now hunting for priv esc
is it just me or the lab is down? can’t reach the foothold machine, although my VPN is connected and I do have the tun0 ip set
Type your comment> @crankyyash said:
Type your comment> @McNinjaSovs said:
Have been stuck on NIX02 after I got the user flag some days ago… I feel like I have tried everything, but I’m clearly missing something… Anyone that can help me?
Don’t know which user you are but search for specific data in their directories. There will also be a executable file standing out to you in your enumeration. Try to find what this file does and whether/how you can leverage it to escalate.
Thanks! but I don’t have shell on the machine yet. Found a vuln that allowed me to read the user flag but I can’t figure out how I’m supposed to get a shell
Stuck on priv esc on WS03. I found the interesting local service and binary. No matter my input with the binary the results are always the same. I could give it 10000 characters and still the same results. I cannot make it do anything else.
Type your comment> @McNinjaSovs said:
Type your comment> @crankyyash said:
Type your comment> @McNinjaSovs said:
Have been stuck on NIX02 after I got the user flag some days ago… I feel like I have tried everything, but I’m clearly missing something… Anyone that can help me?
Don’t know which user you are but search for specific data in their directories. There will also be a executable file standing out to you in your enumeration. Try to find what this file does and whether/how you can leverage it to escalate.
Thanks! but I don’t have shell on the machine yet. Found a vuln that allowed me to read the user flag but I can’t figure out how I’m supposed to get a shell
You are at the same situation as me. Would also appreciate a nudge in the right direction! cheers
Type your comment> @shaunography said:
Type your comment> @McNinjaSovs said:
(Quote)
You are at the same situation as me. Would also appreciate a nudge in the right direction! cheers
Be default you can’t read everything so you would assume it’s not there. Read up on the vuln as there are different ways to read things.
Type your comment> @kale said:
Type your comment> @shaunography said:
Type your comment> @McNinjaSovs said:
(Quote)
You are at the same situation as me. Would also appreciate a nudge in the right direction! cheersBe default you can’t read everything so you would assume it’s not there. Read up on the vuln as there are different ways to read things.
Got a shell on NIX02 now, stumbled across a very useful comment along with some base64.
Type your comment> @kale said:
Stuck on priv esc on WS03. I found the interesting local service and binary. No matter my input with the binary the results are always the same. I could give it 10000 characters and still the same results. I cannot make it do anything else.
Pm me if you still need help
Type your comment> @shaunography said:
Type your comment> @McNinjaSovs said:
Type your comment> @crankyyash said:
Type your comment> @McNinjaSovs said:
Have been stuck on NIX02 after I got the user flag some days ago… I feel like I have tried everything, but I’m clearly missing something… Anyone that can help me?
Don’t know which user you are but search for specific data in their directories. There will also be a executable file standing out to you in your enumeration. Try to find what this file does and whether/how you can leverage it to escalate.
Thanks! but I don’t have shell on the machine yet. Found a vuln that allowed me to read the user flag but I can’t figure out how I’m supposed to get a shell
You are at the same situation as me. Would also appreciate a nudge in the right direction! cheers
Find out which application, sensitive files may be present on the system and whether the apps have files with sensitive information or not. Hints have already been given in labs. Focus on what your main aim is while doing LFI. Read up more on LFI for this.
Dont know if this is spoiler or not. Remove this if it is
Type your comment> @crankyyash said:
Type your comment> @shaunography said:
Type your comment> @McNinjaSovs said:
Type your comment> @crankyyash said:
Type your comment> @McNinjaSovs said:
Have been stuck on NIX02 after I got the user flag some days ago… I feel like I have tried everything, but I’m clearly missing something… Anyone that can help me?
Don’t know which user you are but search for specific data in their directories. There will also be a executable file standing out to you in your enumeration. Try to find what this file does and whether/how you can leverage it to escalate.
Thanks! but I don’t have shell on the machine yet. Found a vuln that allowed me to read the user flag but I can’t figure out how I’m supposed to get a shell
You are at the same situation as me. Would also appreciate a nudge in the right direction! cheers
Find out which application, sensitive files may be present on the system and whether the apps have files with sensitive information or not. Hints have already been given in labs. Focus on what your main aim is while doing LFI. Read up more on LFI for this.
Dont know if this is spoiler or not. Remove this if it is
Found it! Thanks @crankyyash
Hello all. I’m currently stuck on getting the initial foothold. I’ve been able to do some work getting into the first system, but have hit a wall. Anybody available to PM?
Spoiler Removed