Official Time Discussion

Hello everyone!

I think I need a little nudge to get user. I’ve been working on a PoC that works locally (I have RCE, able to get reverse and bind shells).
Now I’m having a hard time applying this PoC to the target.

I can see the file i*****.**l is successfully uploaded on the server, but I get nothing back :confused:
The error in the parser is “[…] command: slow query […]”.

Anybody else encountered this issue?

Thank you and happy hacking!

edit: I finally got user… It turns out I had copy/paste errors (yeah…) in my i*****.**l script. It’s not the first time it happens, sometimes copy/pasting doesn’t work well for some reason. If you have the same error as I had, make sure to triple check your script, and maybe even rewrite it manually!

Does anybody know why a netcat reverse shell is unstable ?!

Thank you!

I started like 3 hours ago with this box, and I’m in a dead end… I found the vulnerability, I believe… and actually I’m able to hit my local machine… but also it responds with a Validation Failed slow query… And can not hook my exploit… Any advise?

– Found my error… Sintaxis :neutral:

Type your comment> @Netpal said:

Hello everyone!

I think I need a little nudge to get user. I’ve been working on a PoC that works locally (I have RCE, able to get reverse and bind shells).
Now I’m having a hard time applying this PoC to the target.

I can see the file i*****.**l is successfully uploaded on the server, but I get nothing back :confused:
The error in the parser is “[…] command: slow query […]”.

Anybody else encountered this issue?

Thank you and happy hacking!

edit: I finally got user… It turns out I had copy/paste errors (yeah…) in my i*****.**l script. It’s not the first time it happens, sometimes copy/pasting doesn’t work well for some reason. If you have the same error as I had, make sure to triple check your script, and maybe even rewrite it manually!

Does anybody know why a netcat reverse shell is unstable ?!

Thank you!

Thanks to your comment I saw my error :smile:

1 Like

If anything, this box taught me to really triple-check my code before uploading it to a target. I wound up writing my own “server” to test the payload, so I could see the error messages instead of “slow query”…

This one took me way longer than it should have.

Rooted, this was a nice box that forced me to document and study d*********n
Foothold is the hardest part, after banging my head several times, found a working exploit. First I tested on my local machine, then I was ready to fire it up against target and got a shell.
Root was easy using common enumeration script, found a file with particular permission that can will let obtain what you seek. There are several ways to do this last part.