Official Codify Discussion

Finally got around to playing with this one.
I was overthinking the initial foothold with some proxy setup but it was really simple.
The lateral was also normal enumeration.
The privesc was very fun :smiley:
If someone needs a hint, DM me.
See you on the next one :wink:

Pretty sure there’s an unintended privesc method.

root easy mode
root slightly more difficult mode

Both are similar but one doesn’t involve the box’s namesake.

Cannot connect ssh :frowning:

Is this part of the challenge???

Unrelated. Reset the machine.

Rooted. I’m still confused as to what the actual vulnerability is, can someone PM me any resources to read up on it.

Rooted!

Initial Access: Try to identify how the application prevents malicious acts; what sandbox uses; are there any vulnerabilities in the used version?

User: Now you have initial access. Move in the box. Where can website data be stored?

Root: There is a bash script. You can do something wild! Challenge your scripting skills!

1 Like

I think i have found your script at home directory someone left there :face_with_hand_over_mouth:

It automates wild method people have been takling about and makes privesc super easy.

Is the mysql backup a rabbit hole?

Forget it. It wasn’t a Rabbit Hole

having trouble with establishing a foothold on machine. i usee a module in metasploit but a session faiils to establish

I get a reverse shell but it exits automatically. i don’t understand why? did someone face the same problem?

Great beginner box. As always, enumeration and your Googlefu will be your greatest asset.

Foothold: It’s blocking some things. Maybe there’s a way to bypass it.
User: Enumerate the filesystem. Once you find the file, look inside.
Root: Find out what special things you can run and look at the contents. The exploit is WILD but once you discover it, you can use it to FORCE out some information.

i am able to ping the machine but i can’t access the web page. Any idea what i am doing wrong

1 Like

I was able to go “WILD”. Now I am supposed to see the ROOT password in the process list.
However, all the commands like top/htop/ps -ef/ps aux/ - all of them do not show the password and mask it instead.

This is what I see:

/usr/bin/mysqldump --force -u root -h 0.0.0.0 -P 3306 -px xxxxxxxxxxxxxxxxxxx sys

What is wrong with this machine? I like this level of security, but not in this situation :0)

Thank you for this challenge! :slight_smile:

FOOTHOLD : matter of jailbreak
USER : enum and crack
ROOT : find the magic symbol and observe execution

Cool box, but some of you need to learn not leave your solver scripts everywhere. Got the user flag, noticed some interesting python code named “script.py” and by the time I realized what I’m looking at the privesc part was spoiled :frowning: Do you leave web shells around in a real engagement as well?

Running nmap returns no open ports… What’s going on?

Nevermind, reset the box it’s working now.

add to /etc/hosts

the box seems very unstable. commands in the Editor are only getting through once in about 3 times, and also revshells are lost within 20 seconds…
what can we do? ( machine reset gets downvoted)