Official Time Discussion

@Cr4ck3rB0i said:

yes absolutely l stuck. Can you help me?

I can try.

firstly l found 2 open ports. and l searched them in metasploitabe, but l couldn’t find anything. Actually, l am new at ctf and it’s my first machine.

@Cr4ck3rB0i said:

firstly l found 2 open ports. and l searched them in metasploitabe, but l couldn’t find anything. Actually, l am new at ctf and it’s my first machine.

Ok - first, time is a difficult box even though it is rated as medium. It will require some out of the box thinking and you will need to customise public exploits to get them to work. I am not aware of any pre-configured or automated attack that will get you a foothold.

I strongly suggest you should work through the Starting Point boxes first and, if you are a VIP, try some of the easy boxes released last year (all the current boxes are harder than their rating suggests).

If you are dead set on working on Time, then you need to look at the page you’ve got and try things. Start with common escapes. The look closely at the output and modify your attack. Check the output again and modify. Keep going through that until you have an idea of the vulnerability then you can find some public exploits which - with modification - will work.

Just got root… I found escalation to be definitely too trivial. (few seconds) Maybe I found someone else file. Easy machine…

Got root. Little hint about foothold/user - “It’s not about Friday, although it looks similar. It’s newer”. Waste lot of time in this wrong way. I hope it’s not a spoiler.

Foothold: Luckily there are no rabbit holes (at least I didn’t encounter any). I didn’t even use nmap, the target is obvious.

User: Fighting with eclipse to test locally was the hardest part… I hate that IDE and that language! But testing locally definitely helped writing an exploit that works. I didn’t use any off-the shelf script, some experimentation was needed to get everything just right and find the stuff that works.

Root: Too damn easy. Looks like there are multiple obvious candidates to escalate privileges. No surprises here.

All in all a very nice machine. The user part takes some time but with an evening of reading up on the topic, even I managed to come up with a solution from scratch.

Hey Guys, I’m having some issues with getting root despite how easy everyone says it is. Can someone give me a PM?

Specifically I’m trying to use SSH within the shell and getting some weird errors.

Hey guys, need help.
I generated the payload but seems to have some erros, can someone please PM me?

Owned user, but i think i can do it another way, ill try later.

Rooted! The way to root was very fun.

PM me if you need some nudge.

Lol, root flag was super easy
This should be rated as “easy”

@kurogai said:

Lol, root flag was super easy
This should be rated as “easy”

Privesc is easy… if you know how… The initial foothold certainly isn’t in the easy category.

I agree that if you know the technology in question this isn’t the hardest medium box, but then they aren’t supposed to be.

rooted!! Foothold took me a few hours to figure out. Took a break and revisited it with a fresh mind and had a shell within minutes. Let me know if you’re stuck!

Can any help me? i’m stuck. ty

@k01n said:

Can any help me? i’m stuck. ty

What are you stuck at?

rooted!!

for me the the easiest part in this box is getting in to the root. i was stuck in foothold but after some research i got a shell.

feel free to message me for hints

Got user. Shout out to @1z3n!

can anyone help me with the root ?

Hello, can somebody help me with an error message that i get for my reverse shell?

“bash: cannot set terminal process group (-1): Inappropriate ioctl for device” 400 -

Never mind; i fooked up :slight_smile:
servering on same port as my reverse shell :slight_smile:

Got user and root. Need correct CVE for User and presence of mind for root :D. This was my first Active box :slight_smile: