Me too.
I wanted to display the files in the folder and that would kill me, but the guy above has root. I donāt know how. Maybe Iāll find out after the machine retires.
The key is sha512 hashedā¦ I donāt know the password length. Calculating it with a hashcat took forever.
Moreover, the hash iteration is several times.
I donāt knowā¦
There is a way to be root
by LFI.
Okay. Great. Iāll investigate. Thanks.
Have you found the flag and are you investigating the machine further?
Someone told me about LFi earlier, but I canāt get around to it yet.
Have you found the flag and are you investigating the machine further?
Yes. Just out of curiosity.
All right. I thought you couldnāt find aiohttp. Thanks again for the reminder about LFI. Iāll come back to this.
yes I use that
ssh - How to find Private Key Location - Stack Overflow
Look for openssh keyš
Thanks!
hey i want help in exploit
at what stage?
I managed to get rootā¦ it took me a while to find the key because the manual says User, but I managed. Thanks again, thatās a lot of knowledge!
For those having trouble with root getting the 404
try using the --path-as-is
switch with curl
once you have the port forwarded. You could also do it as rosa
locally on the box once you get to that point. There really isnāt a need to forward the port unless youāre simply curious as to what the service running looks like.
am i supposed to crack the hash for root that i found using path traversal vuln?
Just got root flag, but without being root, is that the intended way?
hi, for foothold i tried different payloads but none of them worked, is there anyone can help me
(server gives internal error everytime)
thanks but why doesnt it work with ābashā only
Got the exact same problem.
Did anybody actually get on as root, is a shell with the path to root possible? I got the final flag but am just a bit curious, donāt wanna chase a rabbit hole down if itās not possible.
Also if anyone is still stuck on this, DMās are open for nudges.