You should be getting a call back check your netcat listener.
Hint: u can use curl to directly display the root flag without needing to crack the hash
by this PoC just try to combine some LFI payloads with curl on localhost:8080
I was being a dummy I got it finally.
Make sure your ip is correct in your file and netcat is listeningā¦
anyone facing issue with uploading the file iām not able to do it
My god finally!, got my first machine after some problems with root , anyway was so fun, i hope iāll complete more.
Iām stuck at app user, is the hashcat bruteforce a rabbit hole? Could someone help me please?
edit: I got it, for anyone in the same position: seclist can help and --show too
We shouldnāt always aim for reverse shells. Sometimes simple enumeration does the trick.
Interesting foothold, enumeration and basic concepts gives us root.
Enjoyed it quite a bit, nice box
DM me if you need any help, i will give some hints.
Got rootā¦ nice box. Had funā¦
feel free to ask, if youāre stuck.
Does anyone know what to do after getting credentials? Kindly DM!
be precise, u got creds of a user, even though there are many hints in forum, use these creds, get something u are missing. DM if you to ask something
For some reason I couldnāt get the reverse shell of this box
I tried this first then I also tried using a bash script but still couldnāt connect to the netcat server.
Am I the only one who is struggling in it
i need help to get the root flag i got the passwd for rosa already and the user flag
Do I need to crack the hash found in the db
Yes, itās md5. Use john for example.
Check for connection: netstat -tuln
Use busybox payload