Exploit the CVE-2024-22120 vulnerability on the spawned target and enter the content of the root.txt file located at the /root directory as your answer

Exploit the CVE-2024-22120 vulnerability on the spawned target and enter the content of the root.txt file located at the /root directory as your answer.

Hello did you manage it ? I have shell access but for some reasons it does not give any output of my commands

I’m having the same problem. Do you know of any other solutions?

did you manage?

Never fear, I is here…

If you read carefully

Exploitation Process

Let’s navigate to the bottom of this section and click on ‘Click here to spawn the target system!’. Then, let’s SSH into the target IP using the provided credentials. The vast majority of the actions/commands covered from this point up to the end of this section can be replicated inside the target, offering a more comprehensive grasp of the topics presented.

And go to the beginning of the Linux module you will find a set of credentials

Connecting to Linux Purple Module Targets

ssh root@IP and use the provided password than cat /root/root.txt

What is the point of getting /root/root.txt using known credentials, if the actual CVE-2024-22120 exploit has nothing to do with it?