Official discussion thread for Corporate. Please do not post any spoilers or big hints.
Apparantly no one has been able to gain user flag???
Anyone got a success in trying to connect manually to the âotherâ protocol using w**t ? keep getting 502
any hints for foothold?
run away, save yourself from the pain
I am struggling quite a bit too
Whiskey helps. Glad this oneâs over. GG season 3.
any hints?
Whiskey helps.
So does wine! Thanks to the box author a worthy sequel to Bookworm.
Yes, it was a really good box. But yes, it takes time, itâs definitely not a hit-n-run
Good job @JoshSH. It turned out better than what I expected, tbh.
hey people, so Iâm currently inside the people
webpage. Found the âinternalâ networks but couldnât find any vulnerable services in there for now. I have some ideas about how I can proceed within the people
page but I couldnât pull it off. So could i ask for some help on this
Just a final push needed to bypass for root can someone give me a nudge regarding that
bruh what the â â â â to do with this it role guy?
Got root! User was hellish and root was laborious.
Thanks to @akiraowen @JimShoes @elwrci @maza
Without your help it wouldnât be possible.
Can someone help me get into P**x**x. i found the page linked in the CVE and am having trouble with the XSS
Thanks to @0xffffff , I can do the priv esc. Finally rooted after 6 days.
rooted. still wondering if b********n was a rabbit hole or if I skipped something. Thanks to @0xffffff for the nudge.
Rooted! Man, this box does not screw around. Itâs very long-winded and the initial foothold is hard to find, but after that it gets real fun. Even when I was on the unintended or flat-out wrong path, I learned something new. Big thanks to @respawn for the hint on the foothold!
Hints for the foothold:
-
No shame in asking for help, but you may find it hard to breathe when you find the problem. Go somewhere with a little more breathing room.
-
The parameter we take for granted is now here to help you at the most opportune time.
Hints for user:
-
Get inside. Youâll find a lot more opportunities here, but you gotta look as far as you can.
-
Sharing is caring, and the people here LOVE to share. Something will stand out.
-
Answerâs practically out in the open, you just gotta take it and try it. Keep in mind that not all targets are equal.
Hints for root:
-
Why do I use DDG instead of Google? Because you can tell a lot about somebody based on what they search.
-
Itâll take some time, but if you know the process, you can find the secrets within. Even if the protected secrets are in a nonstandard format.
-
The nuts and bolts are revealed. But in a bookkeeping environment like this, what do you think the most common security mistake is?
-
You donât need to know a secret in order to set it, but some secrets canât be set.
-
Climb high, to the sky! Or at least to as high as you can get in a workstation. Itâll take some engineering to do that.
-
You couldnât set a secret, but now you can definitely steal one. Mount yourself on your horse, take it, and charge to the master!
-
Protect your duplicated secrets, you heathens. How many times do we need to have this talk?