ssh for service forwarding needs password, is the password for other service really crackable?
talking about priv esc
Struggling with foothold. Found CVE, ran exploit but not getting any connection on listener??
that python files has issue. Check it again
i also finding it from last 2 days. any clue you have?
is CVE the right way to root?
I tried the x** cve locally, and add an froxlor admin account successfully.
but i canât get any reply on the weekly machine
oka⌠My payload is wrong. someone added the default user in the payload.
After quite a few hours of going in circles, I guess a hint for both the initial foothold and root is: stick to the browser. Btw, the advice on the forum was great! Ty
Send me a dm with your payload iâll give you some hint
Does this box have anything to do with them using froxlor or am I just wasting my time
You are in a whale jail try to escape
this rootâŚim struggling, probably need a nudge.
same here, feel free to share
This happened to me too, needed to modify the payload significantly to fork the process
Did you get into the f**** admin panel?
DM for nudges.
i managed to get the creds but i cant find a login page anyone knows how to access or even if there are supposed to be used in a login page.
Try to enumerate services and open ports on localhost
I can exploit the aplication with a reverse shell but Iâm in docker container and Iâve wasted so much time trying to scape the container and I couldnât. Does someone give me a hint pls?
I think someone said this already. But âLook in the shadowsâ.
Could someone just please DM on how to get root. From my understanding there is evidently two different ways. One is difficult and the other may work and may not work. Please helpâŚ
Roooooted!!!
Once you log into fxxxxxx, remember the strange port you found during the initial scan.
It might help.
Root was really tough, but it was a really fun box!
this helped a ton thank you