Official Blurry Discussion

Any hint for root?

Any hint for finding CVE

Take a look at vulnerabilities for the service you discovered. There is a site with a couple of PoCs (at least descriptions of those) and CVEs for it.

I have try to call reverse shell but the shell call from my kali => Dont know why :slight_smile:

I need hint on User

Rooted, I wasted a lot of time in the first part but after that it was very straightforward. Thanks everyone here for the tips!

Feel free to DM if you need a nudge.

Rooted the box finally. ChatGPT is your friend for this box.

1 Like

Please i need help with initial access, anyone i can DM?

Do you have hint for root ?

I have a foothold now and I’ve found the priv esc vector. I think it’s weirdly similar to the foothold. Any tips?

Should be very similar to the foothold vector, will try it out later, but I also think this is the right direction

1 Like

did you find how to pass the object directly and not uploading a file ?

you can actually use AI for this! Ask Gemini or ChatGPT: “In pyhton, how do you add a class to a dictionary” and it will generate an example of this. Gemini gave me a proper example

This might help you guys:
@Kayiz @BL00dH0und @OliveiraX1

2 Likes

test your permissions on the files

1 Like

I found the POC and all that but I don’t know how to run it etc, I’m not good with code either, any advice or DM to help me?

Thanks for the tip sir, i definaly use our gpt friend yesterday to help me out with user and got no luck so ill try later today tweaking it. Love your content on youtube!

1 Like

You can DM me, I’ll try to help, just tell me what you have at the moment.

If anyone can get me a hand here.

I tried the same way the PoC has been done, I get a “It’s not a dictionary” error. When I upload the task directly as a dictionary I only get the content of it when the script runs without executing the content.

DM me!

1 Like

I am stuck on the priv esc. Anyone willing to give me a nudge??