Official Cerberus Discussion

yes you can

make sure that the important stuff is not encoded

2 Likes

Need help on how to trigger the RCE, any advice? Feel free to dm to discuss so I can talk about what I already did in detail.

Read more carefully the message of @sifona ; what are the particularity of ssh keys ?

Can anyone PM me about RCE. I think I understand the exploit, but I cant get an connect back.

I dont really find a posibility for a valid key…Where did you find it…in the path /usr/lib/python…server.pem it doesn’t seem to work

i’m in the same step. In the document you found it is just test environment.
I’m also trying to find any pem file there but without success :frowning:

Please can anyone give us a hint ?

Thanx a lot

The strange thing is, on a standard debian you have these files too

maybe you could add a private key to some known location…

Like in a log file? Or more in the application file

found it, thanx

Now I’m just more confused

Wow this machine is really hard. I’m struggling with the PE for the root.

I’m really struggling to find .pem file guys little help please

Read the Part with RCE really carefully Path Traversal Vulnerabilities in Icinga Web | Sonar

Need a hint. Can caps help me to escape? :disguised_face:

any tips for escaping ?

So found a .pem using the vulnerability and am looking at this article to figure out the RCE. Am I on the right track or do I need to try something else? I’ve tried the instructions on constructing the payload with no luck. Thanks

what part are you doing

Any hints on privesc to administrator once on the Windows box?