I’m bashing my head into a wall right now…
Got initial foothold under a*e using a popular framework. Cannot seem to connect to ml, even from the shell. Tried port forwarding and still no luck. BTW, I have the credentials to connect, but can’t seem to do so. Any help would be greatly appreciated.
EDIT: NM, hahahaha… found the alternative, and much simpler, method
Hey, could you PM me the alternate method? I’ve been trying to connect to the database, but to no avail. I have the creds.
Foothold: The clue is in the name. User: A little two-step and then you can get in through the frontdoor. Root: The master of an older generation can show you the way with his teachings.
Getting the thing to actually build seemed to be the hardest part.
Am stuck in root. Even though I went through linpeas and other methods I haven’t found a way to go about it…maybe i just can’t see it. If anyone wants to drop a hint dm me
Fun little box! Found getting user quite straight forward as it involved some staple techniques that every beginner should know, or use this as the perfect opportunity to learn if they haven’t yet.
The root user was a little trickier as I didn’t immediately work out that I’d found the right exploit, as I’d seen some closed things and discarded the idea.
After trying a little crafting of my own and running into all sorts of issues, I realised I could adapt what I found before and after a little decoding, just used what was already out there.
It didn’t work initially as I think someone else had already broken something on the box, but after a reset, the exploit worked exactly as it should.
Okay I came upon an article that explains about something “DIRTY”. Got an exploit related to it but the system is not vulnerable to it. Do I need to change something in that? Or am I on the wrong track? Trying for root.
Has anyone had problems spawning a proper tty shell after gaining foothold? I keep getting OS error: out of pty devices. Is it due to selinux and tips to overcome it?
Lots of people struggling with environment setup - you don’t need to craft the payload yourself… you can re-use another…
To root I crafted my own after struggling to figure out a better way to make it happen.
I knew there ha to be something more elegant.
I’d love to discuss with your alternate approach. Can you pm?
Okay I came upon an article that explains about something “DIRTY”. Got an exploit related to it but the system is not vulnerable to it. Do I need to change something in that? Or am I on the wrong track? Trying for root.
There are two versions of this well-known exploit, right? Try to read the second one thoroughly, everything you need as a “payload” is there
Okay I came upon an article that explains about something “DIRTY”. Got an exploit related to it but the system is not vulnerable to it. Do I need to change something in that? Or am I on the wrong track? Trying for root.
There are two versions of this well-known exploit, right? Try to read the second one thoroughly, everything you need as a “payload” is there
but does this still require snake script or am i supposed to use sc