Official Sightless Discussion

Nasty but fun… learned a lot but this was not an easy one. :see_no_evil:

I’m stuck. I search pass for the priv escalation (I have user access). I found the process and I think I know what I need to search, but I dont find what to do with that informations…
I read all message here, but I have no idea on how to find these creds…
Someone can help me?
[EDIT]
Rooted!

I am stuck with internal panel Froxlor after port forwarding and now from than how to exploit it get the root flag any hint would be much appreciated.

Not sure how this forum work…
I just rooted it! DM.

Me solving this one

i´m stuck in F****** service login :frowning:
DM me for a hint

lol i did too. out of frustration i clicked to my other tab and felt stupid lol

Im not sure if there are multiple ways to root but for me the root flag i rated a very easy and the user flag as easy. either way fun box. the way i got root i feel wasn’t to real world but still fun.

ROOTED!

User: It is pretty straightforward: moreover, if you want user flag, why would you search on a root whale :wink: ? Use it for enumeration, you’ll get your user access data, and eventually become user.

Root: interesting process, really liked it. There are to many things to keep an eye on and linpeas is not a lame hint to give, considering that it will highlight 95% Exploitation vectors. Just to don’t make you waste time… There is no need to crack any password. someone will login by himself and you’ll have to spy it. Once you have the access to the portal, rooting is straightforward and left to your imagination.

somehow my linpeas.sh file is not showing in both rt account or m**** account. please help im stuck, i have found the user flag but i need the linpeas to get pw

Where need to be modified in the Floxor’s offical cve_payload?

Me tool ! The problem has been solved?

Someone uploaded root flag to /tmp :expressionless:

image

Someone can confirm it is the correct? I don’t wanna upload it without escalating first

PD: I sent a reboot to the machine the second I saw it

u need to add it to hosts like u do with main title

root

Blind XSS doesn’t seems to work
i wrote multiple payloads and no one seems to work with my IP (didn’t get any request)

make sure you are putting the right ip and then click or refresh the page, might work

how is it solved please guide? im stuck

Got it
About root :
Once you get access to admin panel there is no technical difficulties, just dig into this shitty privileged process and you’ll find.

found the D*******.k** file, but the creds inside didn’t work. Am I on the right path, or was this a well crafted rabbit hole?