Official Atom Discussion

I’ve been trying for an hour to create an instance in the Release Arena, no luck so far. Maybe this box should be moved to insane.

I opened a ticket…

Type your comment> @Bl0w13 said:

Hi all, anybody available to help me get user? I know the exploit and how to execute it but I guess I have been doing something wrong for the past 4 hours. If someone could please DM to help me

DM me. Was stuck in the same boat

stuck on foothold… i know which vuln there is, but i cant the files to place or missing something…

can someone give me a hint?

btw, actually i cant start the machine… not at all nice if you are interrupted during the process

I’ve been waiting for about 24 hours now. still i can’t spawn machine. its pissing me off. fuckin’ annoying!

@Distortion said:
Why does the machine fail to spawn? Anyone else having this issue?

can’t spawn machine too. i reported an issue to jira.

Type your comment> @cbaker said:

I’ve been trying for an hour to create an instance in the Release Arena, no luck so far. Maybe this box should be moved to insane.

:lol:

Was hoping to get back at it today as well. Hackers unite!

Type your comment> @mcdave2k1 said:

stuck on foothold… i know which vuln there is, but i cant the files to place or missing something…

can someone give me a hint?

You can DM me on discord 0xAniket#4393 or here.

Got user, tonight I’ll try to root the box.
I was doing everything correctly but a little dumb mistake that blocked me for like 12 hours.

P.S. I’m using lab vpn and not release arena because I can’t spawn the machine there (IP 10.10.10.237)
Edit: rooted!

Foothold/user: start with classical enumeration and focus on ‘less common’ ways, you’ll find useful information that will let you understand what the target offers. With some google-fu you’ll eventually find the right article that will show you how to get into the box
Root: enumerate with classical tools, beware of rabbit holes!

Thanks for the box!

Could someone help me a bit with a PM?

I have what is needed I think and i can get the exploit to work locally I just can’t figure out how to get the files packed back together so that the user runs it on the remote machine.

Edit: I figured it out finally with a bit of help from @SovietBeast . the machine is incredibly vague about what it needs and my syntax was off so it took me a long time of playing with the payload before it finally worked.

Same here. Please DM. Thank you.

you must not pack back another app, no need a .exe file at all. In this machine there is someone is doing something.

Is it only me having problems creating the machine instance? It says “Machine failed to spawn.”

Type your comment> @linuxfan said:

Is it only me having problems creating the machine instance? It says “Machine failed to spawn.”

Try connecting to classical lab VPN. Atom IP is 10.10.10.237
I had issued spawning the machine in the release arena vpn

Do we need a windows machine for this box? Since theres an exe file, is it a reverse engineering box?

Edit: I guess not… I think i know what to take advantage from. Another one of these!!! Kinda having some deja vu lately :smiley:

anyone able to provide me a point in the right direction, little rusty but I’ve done all the enumeration I can think of but getting nowhere quick.

Type your comment> @0xF13xY said:

anyone able to provide me a point in the right direction, little rusty but I’ve done all the enumeration I can think of but getting nowhere quick.

Start with basic Windows enumeration. If you feel lazy and want to wait around a while, you can always let nmap do your enum for you.

Am I having deja vu???

Rooted with big help from @SovietBeast !!!
The Foothold part was medium level, the root part was not as what I expected. I expected it to be more “windows” oriented …

I am stuck at trying to get user. Same thing as most, I know the vulnerability to exploit but am having trouble executing. PM me if you have a nudge!