Thanks to @nebulousanchor , @CyberMnemosyne and @chvancooten for helping. As others had said, I was there with the user but simply using it incorrectly. Once you are in, you will figure out what to do next, but then you have to do some research. You can end up going down a rabbit hole, or at least I did.
Foothold: Don’t think to far.
User: What do you have access to?
Root: Hardest root for me so far, but google can help u quite well if you know what to search for.
Good box although I don’t like these guess-the-thing stages. But suppose that’s also part of a penetration testing specially in the bad password practices (not comparable at all to “guessing the technology” like in Mango machine). Liked so much to exploit that service on root since I didn’t do that before.
So I’ve found a list of users, and tried every combination I can think of for passwords and users. Can I get a hint in PMs?? I’m sure I’m doing something stupid
I think I’m being really stupid - I have an MB domain, but not sure of what to do so i can use it in im* - can someone just dm me with the right syntax
A good example that sometimes we don’t focus on the simple.
Start, as the whole key is the enumeration, but here the rule is not to complicate and think like every administrator a bit lazy, remember that you have no restriction on passwords, but you also do not have to brute force.
User, the list will open the doors to locate what you need from the user, you already have everything only EW and your creds.
Root, a good example of taking advantage of technology, was a very good method, getting used to throwing commands is important, but I think a good connection will help you climb, I know it sounds very weird, but believe me it should be.
I thank @CyberMnemosyne and @TheRamen for confirming the correct path and especially to the creator of the machine for this very good challenge.