Official Blunder Discussion

Type your comment> @R4H47 said:

anyone having issue with metasploit module ?
Should i do this part manually ?

for me it says “no uuid found in ******”

Type your comment> @merasil said:

Type your comment> @R4H47 said:

anyone having issue with metasploit module ?
Should i do this part manually ?

for me it says “no uuid found in ******”

Same here. Did reset to no avail. Tried pwnbox instead of my own kali without it making a difference

if i use bps*e i see that there is no uuid getting generated by visiting that page… strange that it worked for some1…

ok got it. Used bps*e to debug and saw that i used wrong settings… look at the targeturi

RoOtEd!

Definitely a fun box! Thanks @egotisticalSW!

User was CTF like… Feel free to PM if need help!

Type your comment> @merasil said:

Type your comment> @R4H47 said:

anyone having issue with metasploit module ?
Should i do this part manually ?

for me it says “no uuid found in ******”

Same problem, targeturi is /a***n so it should be fine, other options look good. Also tried other payloads. What gives?

Type your comment> @bashsupremacy said:

Type your comment> @merasil said:

Type your comment> @R4H47 said:

anyone having issue with metasploit module ?
Should i do this part manually ?

for me it says “no uuid found in ******”

Same problem, targeturi is /a***n so it should be fine, other options look good. Also tried other payloads. What gives?

just use bps*e as proxy and look what metasploit is doing

Type your comment> @merasil said:

Type your comment> @bashsupremacy said:

Type your comment> @merasil said:

Type your comment> @R4H47 said:

anyone having issue with metasploit module ?
Should i do this part manually ?

for me it says “no uuid found in ******”

Same problem, targeturi is /a***n so it should be fine, other options look good. Also tried other payloads. What gives?

just use bps*e as proxy and look what metasploit is doing

Oh, I thought you meant set the proxy for the browser. It’s getting late for me :smile: Thanks for the clarification!

Rooted!
Definitely an amazing box, although foothold was a pain
The privesc was unique
Feel free to PM me for nudges

Nice box. It could be rooted in less than an hour. But was I so fast? Not at all, enumeration part took me much longer, than it had to, but I enjoyed it a lot. Root part was quick and great at the same time.

can’t go further than the login page … any help ?

Type your comment> @mmabas77 said:

can’t go further than the login page … any help ?

(w)fuzz with the right extension, you must finding a specific file.

Hello necesito un poco de ayuda /
Hi, I need some help

Rooted after going down a couple of rabbit holes, but had fun in the process and shout out to @HurricaneSYG for the sanity check.

This exploit may require manual cleanup of ‘.*****’ on the target " - I am pretty sure that this wasn’t intended. I can’t advance further with this maybe reseting the box will help. Cause we dont have permissions to write on any files from foothold

Did anyone root this machine manually? I am successfull using msf but as I am preparing towards OSCP I want to do manual exploitation. Can anyone help me pls?

initial foothold and user: way too much magic for my liking and rabbit holes because common tools not working/not being enough…

Rooted! nice and easy box

Having fun on this box, started about an hour ago. what i need to say though is can people please clear their artifacts i.e.e leftover scripts and files as it gives away the game to easily.

I would normally have reset before I started but not when a box is this busy.

Spoiler Removed

Ok, I’m bit stuck at root. I’d appreciate a nudge.