Official Heal Discussion

Sometimes it’s broken. You need to reset until there is port 80 open

1 Like

For root, am I supposed to login to a specific internal service?

I have been sitting here for 2 hours. But the catch is that I haven’t even opened the website yet cause Port 80 is closed even after the 3rd reset and my friend’s second reset.

Having the same issue here, I assume that Port 80 is meant to be open and even trying to connect to it directly doesn’t work.

My linpeas is not working? How else can i find the vulnerable service that is running so as to get root.

Try a netstat -plnt and also a ps aux both of these will give you some useful information. Specifically, netstat will show you ports that are being listened to, and then ps will give you the process list that you can look for the application that might match those ports. Linpeas is great, but i suggest learning a bit of enumeration without it, then use it to make your life easier.

NO, the box is broken here, try resetting it, or connect to another VPN. This box seems to have an issue during instantiation.

em I am having problems viewing the files by LFI. Any help/hints?

Read the Docs and try 2 levels below

What seems to be your problem?

I know which files to point to with the LFI and where I have to do it. the thing is that it doesn’t show me the content.

Can anyone please help me on how to use the exploit.py

I have LFI but not able to locate correct files any help.

Can you DM me please?
About the token.

Never mind: just a matter of paying attention to get it.

1 Like

I found this to be helpful

1 Like

im stuck there too. how to find the token ?

i get it now haha.

never mind just figured out how to get to the LFI…

I’m stuck with LFI.
It doesn’t feel like I’m on the right track.
Also, I’m encountering a lot of 530 errors.

Make sure when you are exploiting the LFI that you have a valid Authorization: [token] header set and try investingating ruby on rails configuration files

For vulnerable internal services you can check processes, with the netstat command in linux. Or ss command.

Example:

ss -tunlp
netstat -tunlp

TheCyberMentor has a great linux privilege escalation course free on YouTube. Skip to the processes section of the video and apply the knowledge