Official Sau Discussion

stuck trying to get shell. found the m******l exploit. cant figure out how to get shell from it, or execute anything for that matter.

Im stuck at this point too m******l exploit doesnā€™t work, i canā€™t figure out if anyone as any tips

Rooted, a big thanks to @5105 for the initial foothold and then it took hours to see that I made a typoā€¦

i am playing with myself. preparing a response and sending request to see my response i just prepared. how cute. :sweat_smile: :rofl:

Too easy!
User: Just enumerate the machine once you got the initial vuln and the rest is all Google, i mean, all the box can be solved just looking on Google; took 2 mins getting your userflag once you found the right PoC.
Root: Insanely easy as well. Even easier than user. Just google the sudo -l output, Google dork and thatā€™s it!

Very CTF-like box, and very fun to solve. Perfect box for beginners developing a hacker tought.

1 Like

You know the kind of exploitation the vulnerability leads to. What does it imply? You also have access to the vulnerable software, so you know in which language you could execute.

1 Like

I loved this machine. Despite its relative simplicity, the 3 exploits are all current and interesting.

Iā€™m sure most are hung up on the 2 things I was -

User: you can need to modify something additional to see the data you request
Root: big thank you to KrYn0mOr3 for the hint on root and I restate here - The dorks of the internet will help you out tremendously

1 Like

I really enjoyed the process to get the user flag. Google really is your friend!

root: You NEED obtain a more stable shellļ¼Œthen try to take advantage of the executable file with special priv

Oh man finally rooted this. Spun my wheels for way too long. It was one of those that when I figured it out I felt really silly. Iā€™ll try to give some minor hints:

Foothold

Enumerate the service. Run some dirbusts to see if you can get some more info about the service. Once you find an exploit, learn more about the exploit. Look up some documentation to figure out more about what youā€™re actually doing.

User

Look into the service you found. See if thereā€™s another way you can send the data to that service.

Root

Quite simple. Basic enumeration will find the priv esc. From there just google what you can do with it.

If anyone needs help, feel free to DM me :slight_smile:

Totally agree , i went into a rabbit hole for couple of hours , then everything till root was easy, thanks for couple guys here who helped me out !!

1 Like

I now have RCE working but I canā€™t get a shell for some reason. Anyone I can DM for help?

no worriesā€¦

1 Like

Rooted.
Another easy box as a compilation of C**s.
All steps are straight forward: enumerating then googling.
if you got a vuln but no target, you may miss something in the initial enumeration (as i did).

1 Like

Found 1st service and vulnā€¦ discovered 2nd service, found vulnā€¦ and stuck at ā€˜login failedā€™ :sweat_smile:
Probably missing something obvious (or syntax) beside skills :wink:

Me too Greguus. Just get login failed, too noob to know what Iā€™m missing!

hey i can ping the box , but i cant view webpages on my browser

rooted!!! DM me for help

Very nice box. Getting PrivEsc was the easier part. I liked the overall path to get a foothold. GL

add the box to your hosts and use the port you found in nmap