Type your comment> @R4H47 said:
anyone having issue with metasploit module ?
Should i do this part manually ?
for me it says “no uuid found in ******”
Type your comment> @R4H47 said:
anyone having issue with metasploit module ?
Should i do this part manually ?
for me it says “no uuid found in ******”
Type your comment> @merasil said:
Type your comment> @R4H47 said:
anyone having issue with metasploit module ?
Should i do this part manually ?for me it says “no uuid found in ******”
Same here. Did reset to no avail. Tried pwnbox instead of my own kali without it making a difference
if i use bps*e i see that there is no uuid getting generated by visiting that page… strange that it worked for some1…
ok got it. Used bps*e to debug and saw that i used wrong settings… look at the targeturi
RoOtEd!
Definitely a fun box! Thanks @egotisticalSW!
User was CTF like… Feel free to PM if need help!
Type your comment> @merasil said:
Type your comment> @R4H47 said:
anyone having issue with metasploit module ?
Should i do this part manually ?for me it says “no uuid found in ******”
Same problem, targeturi is /a***n so it should be fine, other options look good. Also tried other payloads. What gives?
Type your comment> @bashsupremacy said:
Type your comment> @merasil said:
Type your comment> @R4H47 said:
anyone having issue with metasploit module ?
Should i do this part manually ?for me it says “no uuid found in ******”
Same problem, targeturi is /a***n so it should be fine, other options look good. Also tried other payloads. What gives?
just use bps*e as proxy and look what metasploit is doing
Type your comment> @merasil said:
Type your comment> @bashsupremacy said:
Type your comment> @merasil said:
Type your comment> @R4H47 said:
anyone having issue with metasploit module ?
Should i do this part manually ?for me it says “no uuid found in ******”
Same problem, targeturi is /a***n so it should be fine, other options look good. Also tried other payloads. What gives?
just use bps*e as proxy and look what metasploit is doing
Oh, I thought you meant set the proxy for the browser. It’s getting late for me Thanks for the clarification!
Rooted!
Definitely an amazing box, although foothold was a pain
The privesc was unique
Feel free to PM me for nudges
Nice box. It could be rooted in less than an hour. But was I so fast? Not at all, enumeration part took me much longer, than it had to, but I enjoyed it a lot. Root part was quick and great at the same time.
can’t go further than the login page … any help ?
Type your comment> @mmabas77 said:
can’t go further than the login page … any help ?
(w)fuzz with the right extension, you must finding a specific file.
Hello necesito un poco de ayuda /
Hi, I need some help
Rooted after going down a couple of rabbit holes, but had fun in the process and shout out to @HurricaneSYG for the sanity check.
This exploit may require manual cleanup of ‘.*****’ on the target " - I am pretty sure that this wasn’t intended. I can’t advance further with this maybe reseting the box will help. Cause we dont have permissions to write on any files from foothold
Did anyone root this machine manually? I am successfull using msf but as I am preparing towards OSCP I want to do manual exploitation. Can anyone help me pls?
initial foothold and user: way too much magic for my liking and rabbit holes because common tools not working/not being enough…
Rooted! nice and easy box
Having fun on this box, started about an hour ago. what i need to say though is can people please clear their artifacts i.e.e leftover scripts and files as it gives away the game to easily.
I would normally have reset before I started but not when a box is this busy.
Spoiler Removed
Ok, I’m bit stuck at root. I’d appreciate a nudge.