I cannot get the privilege escalation to work with root. I can get it to execute my code when I try manually with the user account, but the automatic system does not seem to work. Any help would be apreciated.
EDIT: Got the flag, for the root flag I had to zip my exploit before trasfering it to the target device and unziping it there again.
i just got the pass, and successfully sent in the flag, send me a dm with your password that you got and i will tell you if you are correct.
Blockquote
xxxx@pilgrimage:~$ cat user.txt
78zzzzzzzzzzzzzzzzzz
xxxxx@pilgrimage:~$ DATE
-bash: DATE: command not found
xxxxx@pilgrimage:~$ date
Mon Jun 26 22:09:58 AEST 2023
xxxx@pilgrimage:~$
hii, i got a username, but i can’t find pass. check php files and find db path, what should i do to find pass? Connect db, check source files or any exploit?, any help? thank you
For all those who r struggling in root, I dont know y but it seems to work (only) when u move the exploit from specific folder to target folder id like to know what the enumeration process to get that detail
Thanks for the hints, I’ve managed to root the box.
From hints I figured out the exploit required to root the box, but I am curious, how did you guys enumerate the b*****k exploit? My linpeas scan did not find it?
I found the user flag, what is the next step to finding the root flag? I have ran linpeas, this gave me a lot of info but not really anything super usefull. I have also looked at ps aux, but this also didnt really help me.
Guys, I need help.
I found e***y and my next steps are totally fruitless. I’ve read the code, tried to find the CVE. I’d be grateful for a little help. Thanks