I currently have the admin login page but nothing else. I’ve ran directory enum, intercepted requests, tried brute forcing login, etc. I’ve gathered that there is an exploit I need to use for the initial foothold but I have no idea where to look for it. I have tried presta shop exploits, ajax login exploits and nothing works. If anyone could give me a hint to save me from head banging I would greatly appreciate it.
Hi,
Could someone PM me any hint to find the admin panel?
Thank you!
Okay, I found it, (looking through internet)
Any idea why that path is not in the “directory-list-2.3-medium.txt” dictionary?
Which dict should I have used?
If you’re meaning the ‘initial’ path, not the ‘admin’ path. It’s in raft-small-words.txt.
Yup, I meant that, thank you
I got a shell as w******a, any hints from here? I looked at “/**t” and the program there has a vulnerability, but I don’t think thats the correct path.
do u mean the txt.br file?
Finally!!!
Finally
anyone could dm me for a small hint? I found the admin panel and the user, can’t log in with the hash or can’t crack it
I think I’m on the same stage as you are: I located admin’s panel and username.
If there is a hash (for that login) I think I need to search inside the files I grabbed again.
So far I stuck again
Hello! I got a user flag and stuck in escalating privelledges, any hints please?
i think you should check web app directory
I found interesting local network ip, but idk what to do next
Also i found the exploit for that, but anything i do doesnt help
Anyone available ? need help with the priv esc, it’s been two days now , Im inside the do**** and can’t find anyway to escape or anything useful in there.
I’ll dm you
I’m a bit stuck on the root flag. I’ve discovered the C***** D******n running “nearby”, and discovered a CVE for that service, but I can’t seem to exploit it because all of its HTTP requests are failing. Could somebody DM me a hint?
I’ve got stuck after getting ssh j**** and pivoting. I’ve located docker container and opened port 5000, done port forwarding and got there was CVE-2024-32651.
but ssti exploit doesn’t work. I’ve read writeups and forum, and as I know it should work. But any payload works.
started this machine yesterday, and well i am stuck at root. i think that container is rabbit hole, i guess, i could be wrong. but if any have any hints for root, or i should be looking somewhere else, a process? a tool?, a file??? anything that could lead to privilege escalation to root. help this fella out.
EDIT: oh it not a trap actually, it was right there just not familiar with that approach.
Im stuck on the Pru* exploit with the no permission error. What did you do to solve this?