ok, thank you I will try that
Hii Froggie . Iāve found 5, the main 2 domains in the different ports and 3 subdomains. The you need to do it mannualy or can do it with an automated tool?
You can use burp or even curl i think to find it. Im not great with that type of exploit at all and i still dont fully understand it someone had to hold my hand some with it. but will need automated to extract the goodies.
The hint is to read the code when you get to the instance.
Anyone else making progress? I feel like Iāve exhausted every avenue of approach.
Where you at. Ive gotten a foothold.
Iām still runninā!
I think iāve found a ghost admin page, but am unsure because I get 404, etc.
Iāve tried looking for content API, custom endpoints, database files (which redirectā¦a lot), Iāve founf the sitemap.xml (however, more rabbit holes, I believe),
Iāve followed up on the redirects, but - 404ā¦
Tried accessing the Ghost API is failing, tried looking for hidden or bugged endpoints, exposedd config files, etc.
Iām ded. I suppose you could sayā¦Iām a
You need a actually you need 2 's for foothold.
2 subdomains are needed for foothold.
Feel free to DM me for more detailed nudges.
Thou must, be 'n meā¦I looked back through my notes and found the dayumm ā¦Jeezā¦LEtās see what happens.
Where we at, boys!?
Been afk for a whileā¦ Just starting the box now to check the perspective.
BOO
Itās nuts in hereā¦Justā¦effinā nuts. If you need a little assistance (or at least what I can provide, ask away). Iām still pullin intel at the moment.
I found a shite ton of data, DNS, endpoints, one key, and still goināā¦however, I gotta take a break. So itās up to you diligent folk now.
ā¦Kindaā weird how SpIdErS and GhOsTs go ātogetherā, aināt it?!!
Adios, for now.
BROTHERS
we are getting a good bottom spanking with this one.
gobuster will very quickly get you to a login form ā it is easily cracked. From there, you will get a lot of info about users and a few directions you could take.
Maybe look for the code source repository as the next step
And to make sure you actually readdd the code!
LETS GOOOO.
Im fried. This box was so frustrating.
Good job!!!
Thank you my dude
Seeing the number of pwns so far its clear the Unintended path is what people are doing. The box clearly guides you to the unintended path more than the intended path. I still donāt know how to access the high value target. The unintended path completely bypasses half the box and is so much easier to follow becuase all the permissions and stuff SCREAM do this method.
AD exploiting or LOLBins!?