Any hint for root?
Any hint for finding CVE
Take a look at vulnerabilities for the service you discovered. There is a site with a couple of PoCs (at least descriptions of those) and CVEs for it.
I have try to call reverse shell but the shell call from my kali => Dont know why
I need hint on User
Rooted, I wasted a lot of time in the first part but after that it was very straightforward. Thanks everyone here for the tips!
Feel free to DM if you need a nudge.
Rooted the box finally. ChatGPT is your friend for this box.
Please i need help with initial access, anyone i can DM?
Do you have hint for root ?
I have a foothold now and I’ve found the priv esc vector. I think it’s weirdly similar to the foothold. Any tips?
Should be very similar to the foothold vector, will try it out later, but I also think this is the right direction
did you find how to pass the object directly and not uploading a file ?
you can actually use AI for this! Ask Gemini or ChatGPT: “In pyhton, how do you add a class to a dictionary” and it will generate an example of this. Gemini gave me a proper example
This might help you guys:
@Kayiz @BL00dH0und @OliveiraX1
test your permissions on the files
I found the POC and all that but I don’t know how to run it etc, I’m not good with code either, any advice or DM to help me?
Thanks for the tip sir, i definaly use our gpt friend yesterday to help me out with user and got no luck so ill try later today tweaking it. Love your content on youtube!
You can DM me, I’ll try to help, just tell me what you have at the moment.
If anyone can get me a hand here.
I tried the same way the PoC has been done, I get a “It’s not a dictionary” error. When I upload the task directly as a dictionary I only get the content of it when the script runs without executing the content.
DM me!
I am stuck on the priv esc. Anyone willing to give me a nudge??