Finally rooted… this easy box could be ranked a tough medium last year
And the box get reloaded sometimes in every 5 minutes…very annoying
Foothold: if you nmap it well it’s fast
User: now this is where the challenge starts, get those proxychains and see what you can do within OWASP top 10 - but don’t stuck too much getting an easy admin session but make one. There’s a paper around which explains well but not providing the exploit
Based on the article, libapache2-mpm-itk was found in early 2014 to cause issues in functions like seteuid(). If you “cat /usr/share/doc/libapache2-mpm-itk/README*”, you will see the README file was created in 2013 which probably already has that issue.
Hi there, I managed to enumerate the ‘other’ connection type, and reading through the enumeration I got offered a username & password, which I think I wasn’t supposed to get as I gather I’m meant to use an API to get in, am I correct in thinking this?
Already pwning pandora. The key in this machine is enumeration is the most important thing.
User : Please read and analyze the results of the enumeration
Root : Really EZ, just classic.
What a crazy ride . This was definitely a tough one.
I believe there’s enough hints here.
Great box because it’s not a “standard” box as we’re used to and this is great.
Foothold was pretty easy and user was, for me at least, hard ! But funny and learned a lot of things. I’m not even sure I did it the way it’s supposed to be done, if anyone wants to discuss it just drop a DM on Discord.
Hi,
I need help, i can login into the p******_c***** as m*** but i don’t know what’s next. I explored the whole panel but can’t find anything. I have tried some exploits on the g*** module but none of them is working.
Foothold : Well, only 2 services discovered and nothing relevant. So the catch is elsewhere in another vector from your favorite recon tool There are other boxes with the same functionality. So retrieving the credentials to connect to ssh is easy.
User : There are 2 users. On the recon step you see a special check program running as root. The command inside gives access to the api. The check output shows an IP.
Root : a recent vulnerability on *nix systems gives proper root immediatly. So there’s no fun. Boxes need to be patched
I’ve got root, but I don’t understand how the key is used correctly? If anyone knows how to use the key correctly please let me know! You can also contact me if you need help.
Man Box ruined by someone leaving a root exploit binary on the box in the user home directory Cmon people, what happened to leaving your exploits in /tmp/<username>
I’m a bit lost as to what I am doing wrong here. I’m trying to use a URL to get into FMS but when I refresh my browser I get “WARNING: Failed to daemonise. This is quite common and not fatal. Connection refused (111)”. But from what I understand that is not a warning I should be getting the very first time trying to get access to FMS. Any help would be much appreciated.
enumeration opens the way.
recent privilege exploits cut all the “old” ways of privilege escalation into the root.
wow…
no need to interact with the web apps anyway…