Official Codify Discussion

got root by the bruteforce script method, I’m sure theres a way to get it from sniffing the calls from the script but I couldn’t get it to work, if anyone did it that way I’d be interested to hear how

really cool machine, for an easy machine it really does makes you think “out of the box” in such a simple but effective way.
anyone seeking nudges (mainly on root) can DM me

Can anybody tell me if there is a known bug (or I found one) in this machine? Even though require(fs) and child_process should be locked I was able to use it… Should I report that?

It was easy before the root flag, after I accidentally found a ready-made script and thought that this was part of the task, killing two hours for it. Guys, don’t leave ready-made scripts. P.S. if someone can recommend resources for studying scripts, write to me in person I will be grateful

Foothold and user fairly easy.
Root was not easy imo. Look at what you can do, how that works, if there’s any flaws and how you could write a script to exploit it…

Should I use someone else script for priv esc or should I write my own? I dont know py too well but I also don’t want to be that dude…

This box is not the typical “check version → search on exploitdb → get user → linpeas → root”
it asks you to observe, study, UNDERSTAND why something is vulnerable, and then search or write a way to exploit it. Needed some time to exploit, but after all it is easy and really entertaining.