No easy box at all. Foothold and user were just insane, would never have got those without helpful nudges from the good people of the forum. Root was a piece of cake though, assuming I went with the normal path.
Rooted. thanks to @ArtemisFY for helping me in sorting out where i was getting lost.
IMHO, there’s a misconception on the classification easy-medium-hard-insane which is not really related to the true “stiffness” of the box.
hints:
foothold: once you find it, be kind and leave a message asking what you want.
user 1: your favourite enum scripts will tell everything.
root: google the high one.
Edit:
wanted to add that this box taught me a lot more than many other “hard” boxes, so thanks @egotisticalSW
Thank you so much @bertalting and @Smyrie for the nudges on the initial foothold. I guess I was a little cocky because of the “easy” label of this box. Turns out, it wasn’t as hard as I was making it to be. I overlooked one small detail. The nudges helped me see what I missed.
Getting root was pretty hectic, but it all came down to google fu. It was easy enough, just a bit tedious.
All in all, this was pretty humbling for me, I came into it pretty cocky then immediately realized I am NOT Mr. Robot. But seriously, thanks @egotisticalSW for this box!
I feel like I’m somehow overcomplicating things here, I can’t get the shell to pop at all through D***** S***** M******** and the A******, anyone mind helping me figure this out?
Wondering how people discovered the 1st exploit S**I on that page. Since it was kinda blind not knowing how to trigger and check the result
Yeah, I agree, that was a bit obtuse. I figured it out pretty much from luck and viewing source because I found it odd that this page existed, but nothing was there. It was kind of sticking out like a sore thumb.
It’s an odd vuln for an easy box. Not even X** but a really specific offshoot.
I tried many injection into DSM login page but without success … I saw something with GZIP into HTTP, I will start doing some research about it !! could someone guide me it this is te right way !! I´m still looking for the user!!
I tried many injection into DSM login page but without success … I saw something with GZIP into HTTP, I will start doing some research about it !! could someone guide me it this is te right way !! I´m still looking for the user!!
I’ve no idea - it doesn’t ring any bells with me, which implies it might not be the path you need.
Think more about S*** and there are some good articles which can help you build the payload you need for this, or even all the things.
This box is a solid medium one. Definitely not easy.
One word: “Ginger”. But to jump into the machine, you need to either know a lot about Python, or try REALLY hard. All kinds of magic are going on there.
It’s about the command named like the most famous combinator (if you know it – you know it). Check the output, grab the key and use it on the lock.
whispers: the highest port, you have everything for it.
totally got stuck with that si for last 24-30h. trying different places and different payloads without any success… think its pe or n**t params but i’m not sure… maybe no.
can somebody please send me good article which can help or little nudge in PM what i’m doing wrong? i’ll explain what i already did. thanks guys!