Networked

Rooted.

I enjoyed, learned some stuff :smile:

Rooted, ctf-y but fun.

Tip for user

  • please don’t leave the answer lying around.

Tip for root

  • use your keyboard

i continue to struggle with privesc no matter the OS… i got the initial shell relatively easy… but when i comes to building from there… i always get lost. I use all the enum scripts their is, but i never seem to put things together once inside. Can some1 let me in on their process of attacking boxes, and share their goto’s? please and thank you!

Okay so I found what I need to use to PE to root. Not sure what I’m supposed to do with the c*********.** file. I’ve read about how the NM files are configured but so far can’t come up with anything. A nudge would be appreciated.

so i have an initial shell since morning but i can’t read user.txt. I tried a few things related to ssh but no luck. Any nudge?

Type your comment> @slimz28 said:

Okay so I found what I need to use to PE to root. Not sure what I’m supposed to do with the c*********.** file. I’ve read about how the NM files are configured but so far can’t come up with anything. A nudge would be appreciated.

same boat…

okay, so there is something with che***_***. file. but i don’t now how to use that to get priv shell from web shell.

Type your comment> @plusX said:

okay, so there is something with che***_***. file. but i don’t now how to use that to get priv shell from web shell.

Its a file that makes the user know what’s wrong if you look closely

rooted, good linux box, i don’t know why some ppl saying it’s CTF-LIKE

Type your comment> @plusX said:

so i have an initial shell since morning but i can’t read user.txt. I tried a few things related to ssh but no luck. Any nudge?

Man, Any hints on how to get this initial shell?

I am following something but looks like a dead end.

@nuxmorpheus01 after your initial enumeration you will find some interesting pages, from there you just have to get your shell onto the server, one of the most trivial ones there is

Pretty straightforward box ! Not CTF-like at all.

PM me if needed

Type your comment> @monkeybeard said:

@nuxmorpheus01 after your initial enumeration you will find some interesting pages, from there you just have to get your shell onto the server, one of the most trivial ones there is

I have found the pages. I tried to use curl to upload my shell. No success.

Maybe the path I am following is correct but I am failling in the execution?

Rooted, BUT:
Got root by simply trying things. Triggered what I wanted, but I dont understand what’s going on in the backstage for that to work. If anyone got root and knows WHY it works this way, pleaze PM!

People are just resetting the box, trolling other people’s files and abusing root priviledges lol

It’s hard to enum anything when my shell keeps getting killed by other people :L… Anyways stuck at the initial shell found the user.txt but no permissions. Could use a nudge from someone smart.

Hi all, could anyone help / nudge me a bit with the initial footstep (private message welcome too)?
I’ve got the the point that it’s pretty obvious that I need to exploit i**** u***** I’ve just never done it and can’t get it to work (in fact don’t even really know where to begin with it?) Googling didn’t reveal much. thanks

Anyone who could give me a nudge on how to privesc to root? I think I’ve got a general sense of what I need to exploit but even after googling it I still have no clue where to begin with actually exploiting it.

Finally rooted, a couple of interesting steps and not necessarily too CTF’y.

Tip for initial foothold: ā€œbake inā€ something into something else ?
tip for user: timing
tip for root: play around, see what happens with inputs

rooted!

Foothold:
-Trivial, you learn this in your first boxes
-Find out where to Aim
-Aim
-Go to where you fired
-Shell

User:
Filenames are important

Root:
Just escape the ā– ā– ā– ā– 

Everything you need to get from Foothold > user > root is always in front of you, no need for enum scripts