Official Time Discussion

This is the oddest thing, I got user real fast last night and went to bed cuz it was late. Come back this morning and I can’t get the page to grab the payload off my server with the exact same commands.

The weirdest part is it is connected, like if I kill the server it spits out an error message on the page saying the pipe was broken but it never pulls the shell off my server. Just sits there spinning for eternity.

Edit: appears to be an issue on my end

Rooted. If you need some help, DM me.

user: java Validation?? search some CVE
root: amazing ez gg

I don’t understand how people found the vuln so quickly. To be honnest, I went over it, but i had easily 4 or 5 other things to check, so i dismissed it as soon as it didn’t work and checked the other.

Only when i saw the hints did i think that I needed to recheck every single one of those carefully, but without knowing it it’s a different thing. Once you know the hints it’s indeed easy but without the hint you can easily fall into rabbit holes and mess around with things that are somehow realted to the vulnerability which won’t work.

Root is definitely easy and a “classic” of privesc for those who are learning privesc.

Type your comment> @lebutter said:

I don’t understand how people found the vuln so quickly. To be honnest, I went over it, but i had easily 4 or 5 other things to check, so i dismissed it as soon as it didn’t work and checked the other.

Only when i saw the hints did i think that I needed to recheck every single one of those carefully, but without knowing it it’s a different thing. Once you know the hints it’s indeed easy but without the hint you can easily fall into rabbit holes and mess around with things that are somehow realted to the vulnerability which won’t work.

Root is definitely easy and a “classic” of privesc for those who are learning privesc.

My experience was exactly this. Spent all afternoon knowing the weak point but digging through the many possible CVE’s and dead ends before landing on the one that works. It boggles my mind how quickly people pinned down the right one but I’m sure experience plays a role.

Rooted and it was a fun box

Type your comment> @elseif said:

Type your comment> @lebutter said:

I don’t understand how people found the vuln so quickly. To be honnest, I went over it, but i had easily 4 or 5 other things to check, so i dismissed it as soon as it didn’t work and checked the other.

Only when i saw the hints did i think that I needed to recheck every single one of those carefully, but without knowing it it’s a different thing. Once you know the hints it’s indeed easy but without the hint you can easily fall into rabbit holes and mess around with things that are somehow realted to the vulnerability which won’t work.

Root is definitely easy and a “classic” of privesc for those who are learning privesc.

My experience was exactly this. Spent all afternoon knowing the weak point but digging through the many possible CVE’s and dead ends before landing on the one that works. It boggles my mind how quickly people pinned down the right one but I’m sure experience plays a role.

Yeah it was blooded in 8 mins, 51 seconds.

All logical, spent more time using the wrong command over and over again than getting root.

Like everyone says, it is more an easy box than a medium one but cool if you start doing boxes.

User : CVE
Root : it repeats

Rooted, fairly easy!

Rooted! Congrats @egotisticalSW and @felamos!

rooted. no clues to add - there is enough above. thanks for the cool box @egotisticalSW and @felamos.

Rooted! First time I root machine alone (with some hints from the guys in the forum), If someone need help, feel free to DM me with what have you tried.

Anyone able to give me a nudge. I think i have found what i need but i cant see to find the right CVE. HELP!!!

could someone please reach out to me. I do have an exploit and I do get a connection back to my JR**L******* but i still do get a validation error (no context given) and my payload does not execute. I am not very familiar with the whole des********** topic and still dont fully understand how it works. so some advice or a link to a more detailed description would be highly appreciated. It also still might be that I am deep in a rabbit hole. so any advice is highly appreciated. thx. for more details on what I have been doing please pm me.

@zaphoxx i will PM you …

Hi there, could anyone help nudge me towards getting closer to the initial shell, i’m pretty sure i’ve found the right exploit and CVE but I can’t seem to get a reverse shell. I’m also not very clued up on J*** or Des*********** vulnerabilities. Any help would be much appreciated, thanks guys :slight_smile:

While i really like the entry point technology (and exploits related to this kind of features), this box does not really make you work for it.

This is a nice first time / beginner box for this kind of vulnerabilities.

People gave more than enough hints imo.

@DonTheBomb i PM you …

@MariaB , thanks a lot for reaching out.

Rooted the machine. Apart from the finding the right CVE, this machine was quite esay to deal with.
Thanks to everyone who gave a nudge.

PM if you need help