Had a long way until logging in, but after that, root was the easiest thing in the world
This machine gives a good sense of progress, every step has its own lessons and I learnt how to use sqlmap
Recently I kept making scripts to automate some tasks and create misc functionalities, so my rate of completion is decreasing XD
If anyone is needing help, R is always here, I can surely lend you a hand at anytime, just send me a message
Hello, I am a very new beginner and I am struggling with the sql injection, I think I have the right plugin: http://metapress.htb/wp-content/plugins/bookingpress-appointment-booking. I have found an exploit online but I don’t really understand it. Can anyone give me a walkthrough or hint for it, please?
Anyone wanna give me a nudge? I was able to log in to the site but when I attempt to upload ANY media file I get a “This file type is not permitted for security reasons”. I have been trying to look through the source code but cant seem to find anything that would inhibit uploads.
I’m having the same issue. Got so frustrated that I looked at a walkthrough just to confirm I was doing it right. Maybe someone messed with the admin settings on wp?
Hello after you root a machine, please don’t leave files lying around. Just found the root by using cat on a file. Had to see walkthrough on why it was too easy. The steps to find the flag was more complex than just using cat.
I have found what i need to do to exploit wordpress after i log in.
I follow the steps exactly like the exploit says, but for some reason when i upload the file, i do no get a response with the file that i request in base64.
Very easy machine. Finally I enjoyed this without getting blocked for hours. I even done this without the need of a hint.
If you need any help don’t hesitate to contact me
Nice machine. Foothold was a chain of finding the right exploits and knowing where to look. Took a while, maybe I should have made a script for the xxe part.
Root was a lot easier than other ‘easy’ boxes.
Don’t forget to delete the root password file when you’re done.
Hi, as sayed from others uploading a file is a rabbit hole. If you found the right CVE then you just need to look for something more… try to find some usefull information inside files