stuck trying to get shell. found the m******l exploit. cant figure out how to get shell from it, or execute anything for that matter.
Im stuck at this point too m******l exploit doesnāt work, i canāt figure out if anyone as any tips
Rooted, a big thanks to @5105 for the initial foothold and then it took hours to see that I made a typoā¦
i am playing with myself. preparing a response and sending request to see my response i just prepared. how cute.
Too easy!
User: Just enumerate the machine once you got the initial vuln and the rest is all Google, i mean, all the box can be solved just looking on Google; took 2 mins getting your userflag once you found the right PoC.
Root: Insanely easy as well. Even easier than user. Just google the sudo -l output, Google dork and thatās it!
Very CTF-like box, and very fun to solve. Perfect box for beginners developing a hacker tought.
You know the kind of exploitation the vulnerability leads to. What does it imply? You also have access to the vulnerable software, so you know in which language you could execute.
I loved this machine. Despite its relative simplicity, the 3 exploits are all current and interesting.
Iām sure most are hung up on the 2 things I was -
User: you can need to modify something additional to see the data you request
Root: big thank you to KrYn0mOr3 for the hint on root and I restate here - The dorks of the internet will help you out tremendously
I really enjoyed the process to get the user flag. Google really is your friend!
root: You NEED obtain a more stable shellļ¼then try to take advantage of the executable file with special priv
Oh man finally rooted this. Spun my wheels for way too long. It was one of those that when I figured it out I felt really silly. Iāll try to give some minor hints:
Foothold
Enumerate the service. Run some dirbusts to see if you can get some more info about the service. Once you find an exploit, learn more about the exploit. Look up some documentation to figure out more about what youāre actually doing.
User
Look into the service you found. See if thereās another way you can send the data to that service.
Root
Quite simple. Basic enumeration will find the priv esc. From there just google what you can do with it.
If anyone needs help, feel free to DM me
Totally agree , i went into a rabbit hole for couple of hours , then everything till root was easy, thanks for couple guys here who helped me out !!
I now have RCE working but I canāt get a shell for some reason. Anyone I can DM for help?
no worriesā¦
Rooted.
Another easy box as a compilation of C**s.
All steps are straight forward: enumerating then googling.
if you got a vuln but no target, you may miss something in the initial enumeration (as i did).
Found 1st service and vulnā¦ discovered 2nd service, found vulnā¦ and stuck at ālogin failedā
Probably missing something obvious (or syntax) beside skills
Me too Greguus. Just get login failed, too noob to know what Iām missing!
hey i can ping the box , but i cant view webpages on my browser
rooted!!! DM me for help
Very nice box. Getting PrivEsc was the easier part. I liked the overall path to get a foothold. GL
add the box to your hosts and use the port you found in nmap