Official Ready Discussion

Finally Rooted. Thanks for the machine, learning sth useful. The enumeration costs a lot of time…
The escape is not that hard than you think.

root@ready:~# id
uid=0(root) gid=0(root) groups=0(root)

My two cents about this machine

Foothold

After you discover that high port, go check it out and enumerate. With a well known tool we always use on Kali, you can find juicy exploits : Warning → they are incomplete, try to figure out what is missed, or if you are not a dev or don’t know Python so much( advice, you must learn it) find the fixed exploit using Google.

Shell Improvement

If you got a shell, it will be basic and unstable.

Lot of people askin’, i usually do :

python3 -c ‘import pty;pty.spawn("/bin/bash")’
export TERM=xterm
Ctrl + Z
stty raw -echo; fg

User

Get that flag, is in front of you

Root

As other said, use Linpeas if you want, btw there is a folder you have to enumerate, there are files inside and one of them has juicy infos.

Root Flag

If you know where you are, you know what to search for on Google. Hacktricks will definitely help you.

Nice box, i had fun indeed so thank to its creator!

Hope it helps feel free to DM me if you are stucked :smile:

I have to say thanks to @Kiwito and @TazWake : You gave me the hints to solve the situation.

I don’t have to much to add about what @GamesDean said in the post before me… just for the foothold: remember to check one of the first things u should look in a software when you do a PT.

Ayyyyy 1st time getting user.txt with no nudges. Good feeling!

nice and easy box. I think this is a good beginner machine. user did go down very quickly so I got myself cocky and karma slapped me in the face for that.
so for root1 lesson learned: if the witch cant find the snake, dont assume it is not there, it is just hiding under the rails. snake can help you getting a proper shell. once you find the juicy info use it. root2: google on how to get out of the cage; this is well known method.
Best

was a good one even if d***** is totally new for me.
The user part was just more simple as expected in view of the rating. But I did another GL device last week with nearly the same foothold.

One hint in this thread helped me out to escape.
Thx for that nice experience. Learned a lot.

Foothold: Found a helpful snake, but it was a bit moody. It worked once I hard-coded some things. You can grab the user flag with the foothold.

Upgrading shells is a useful skill to have.

Local: I wasted so much time on this. There is just so much to sieve through and things that look useful, but are actually useless. I recommend liberal enum withfind and grep. In the end the solution is easier than you probably thought.

Root: This is easy, just google and follow basic tutorials

It was a easy one ‘Ready’… Got user and root… Try try…

Type your comment> @Arty0m said:

Can anyone help me figure out how to escape? i’m assuming i need to use a certain password to su but i’m really struggling to get a tty. this isn’t something i’ve done before so i might be missing something obvious but all the techniques i’ve come across aren’t installed on the box. Can anyone give me an idea about what i should be looking into?

Any files in your user might help you… To privesc… After getting shell… Files like config files…

Advice for this machine;

ESCAPE!

Any more info please DM.

Just got the user flag! I found two files, one with an private rsa which tried to use as root and the user and no luck… On the second file found some smtp password, but I haven’t been able to use it anywhere either…
Any advise or hint?

@thorthehacker said:

Just got the user flag! I found two files, one with an private rsa which tried to use as root and the user and no luck… On the second file found some smtp password, but I haven’t been able to use it anywhere either…
Any advise or hint?

This is going to suck but “try harder”…

You say you haven’t been able to use it anywhere, that might just mean you haven’t tried the right thing.

Type your comment> @TazWake said:

@thorthehacker said:

Just got the user flag! I found two files, one with an private rsa which tried to use as root and the user and no luck… On the second file found some smtp password, but I haven’t been able to use it anywhere either…
Any advise or hint?

This is going to suck but “try harder”…

You say you haven’t been able to use it anywhere, that might just mean you haven’t tried the right thing.

Thank you so much, it was so easy… Sometimes you just need to go away from the computer so the ideas flow :slight_smile:

Ooof. Got user, and have “root”. But getting out is really hard for me. I’ve tried a few things but at this point i’m more interesting in learning. Can anyone point me in a direction of a tutorial for this part? I’m lost.

nvm, got it. What a FANTASTIC box.

Well that was fun. Initial foothold and final root flag probably took 10% of my whole time. Really upped my “find” game with this box.

Great box.

i got root shell.
DM for help

Can I PM someone for help? I’ve got user, used linpeas, looked through a lot of stuff and still not a step closer than I was when I first got user.

@ExCommunicado said:

Can I PM someone for help? I’ve got user, used linpeas, looked through a lot of stuff and still not a step closer than I was when I first got user.

You need to enumerate. Read the optional things which you don’t normally find on a box here. Get the loot from that, use it.

Then you need to find a way to get out of the thing you are in but it is easier with your new privs.

Hi! I get user flag and exec linpeas, but i dont see how root privesc. Pls dm me for help. Thx!