Official BigBang Discussion

is it normal that /etc/passwd does nor return the complete content?
or is my php filter wrong?

Mine does the same thing.

Well, I’ve got the exploit modified and running, no errors…….but no RCE, just tells me it failed. Any advice from someone who got it to work for the foothold?

tbh, I’m also not sure why some filter resulted in failed or file not accepted.
but there is a repo on github that automate the LFI for read files, you can check the work PHP filter from the script there.

I’m running into the same thing. Always missing either 4 or 5 characters from whatever I try to read.
Reading through the rest of the exploit, I think that’s going to turn into a problem. Would be great to DM somebody that got past this part :sweat_smile:

Feel free to write me in the DMs

What’s the C***T poc you are all referring to? Based on the target stack, I followed two attack vectors without any luck but noting named C***T related to an LFI for this app. I feel like I am missing something on how to trigger RCE

I am in the same problem here always missing 4 or 5 characters to avoid that I’m trying to combine the exploit with wrapwrap
Am I on the good track ?

Character missing is not a problem for the exploit itself

So, here the problem, there’s a lib i can’t download as whole its look truncated because on PHP response limit, so i can’t extract the symbol address because of corrupted file did i doing it correctly?

The few bytes not downloaded of the libc are not a problem. In any case you can get a valid libc in other ways.

hey, are you talking about extracting the png? Because I have tried that and it doent seem to work, how did you do it?

do you mind sharing how do that? i choose the hard way i’m actually working to force to extract symbol from corrupted using python script, but no luck… it can’t get the accurate address

There is a series of 3 articles on ambionics that cover the PoC were are talking about.

The characters missing are due to the characters you add at the front. It’s talked about in one of the articles. For the 2 big files you need to download for the PoC, they should not be an issue, at least they weren’t for me. Granted my exploit isn’t working yet, but I am getting through the parts where those files are used.

Thanks v1nd1c4t10n,

Someone pointed me to the article and the associated repositories. Struggling to adapt it like most of you, I guess :slight_smile:

I am really struggling with the z**b filter. Any hint on how to adapt the PoC ?

Me too

the ambionics articles are at the base and then some more

rooted :slight_smile:

its beyond INSANE :exploding_head:

1 Like

Do have any hint about Z**b and how to adapt the PoC if it’s the correct path ?
Thks