Still can’t find a way to get D user…
I got the /r***_p*** but doesn’t seem to be working on any user.
Any nudges will be appreciated
edit: rooted uid=0(root) gid=1001(xx) groups=1001(xx)
Hey, I can’t find anything interesting. I already searched for directories with Dirbuster… nothing. Looked for something interesting in the source code… nothing.
I would be very thankful if someone could give me a hint to what to look for, maybe via pm.
EDIT: received a hint
I read the user flag real easily (using one technique against the software), but don’t seem to be able to get RCE (using a different technique against the same software), even though I’ve used this fine in other challenges. Therefore I can read a lot of things, but no shell for g or d user. Going round in circles. Anyone able to help me get back on track?
Edit: the RCE technique worked fine - I just had bad characters in my payload. Got root, and more. Good box - definitely learnt a few things - including to not take anything for granted and keep disciplined.
I got shell with g user, but got stuck afterwards. Any nudges?
Just got root. Spent ages going down rabbit holes, but it’s not as complicated as I had thought. Look at what you can find that might have something useful.
Yesterday a get the user flag by lab method, but today I trying the same method but the server answer with http 500. Anybody have this same problem?
Maybe they patched that unintended path. At least for me it also doesn’t work with the lab method (and the ready made exploit also doesn’t work, even with modified payloads )