Exploit the CVE-2024-22120 vulnerability on the spawned target and enter the content of the root.txt file located at the /root directory as your answer.
Hello did you manage it ? I have shell access but for some reasons it does not give any output of my commands
I’m having the same problem. Do you know of any other solutions?
did you manage?
Never fear, I is here…
If you read carefully
Exploitation Process
Let’s navigate to the bottom of this section and click on ‘Click here to spawn the target system!’. Then, let’s SSH into the target IP using the provided credentials. The vast majority of the actions/commands covered from this point up to the end of this section can be replicated inside the target, offering a more comprehensive grasp of the topics presented.
And go to the beginning of the Linux module you will find a set of credentials
Connecting to Linux Purple Module Targets
ssh root@IP and use the provided password than cat /root/root.txt
What is the point of getting /root/root.txt using known credentials, if the actual CVE-2024-22120 exploit has nothing to do with it?