Official Trickster Discussion

I currently have the admin login page but nothing else. I’ve ran directory enum, intercepted requests, tried brute forcing login, etc. I’ve gathered that there is an exploit I need to use for the initial foothold but I have no idea where to look for it. I have tried presta shop exploits, ajax login exploits and nothing works. If anyone could give me a hint to save me from head banging I would greatly appreciate it.

Hi,
Could someone PM me any hint to find the admin panel?
Thank you!

Okay, I found it, (looking through internet)

Any idea why that path is not in the “directory-list-2.3-medium.txt” dictionary?
Which dict should I have used?

If you’re meaning the ‘initial’ path, not the ‘admin’ path. It’s in raft-small-words.txt.

Yup, I meant that, thank you

I got a shell as w******a, any hints from here? I looked at “/**t” and the program there has a vulnerability, but I don’t think thats the correct path.

do u mean the txt.br file?

Finally!!!

Finally :yum:

anyone could dm me for a small hint? I found the admin panel and the user, can’t log in with the hash or can’t crack it

I think I’m on the same stage as you are: I located admin’s panel and username.
If there is a hash (for that login) I think I need to search inside the files I grabbed again.

So far I stuck again

Hello! I got a user flag and stuck in escalating privelledges, any hints please?

i think you should check web app directory

I found interesting local network ip, but idk what to do next
Also i found the exploit for that, but anything i do doesnt help

Anyone available ? need help with the priv esc, it’s been two days now , Im inside the do**** and can’t find anyway to escape or anything useful in there.

I’ll dm you

I’m a bit stuck on the root flag. I’ve discovered the C***** D******n running “nearby”, and discovered a CVE for that service, but I can’t seem to exploit it because all of its HTTP requests are failing. Could somebody DM me a hint?

I’ve got stuck after getting ssh j**** and pivoting. I’ve located docker container and opened port 5000, done port forwarding and got there was CVE-2024-32651.

but ssti exploit doesn’t work. I’ve read writeups and forum, and as I know it should work. But any payload works.

started this machine yesterday, and well i am stuck at root. i think that container is rabbit hole, i guess, i could be wrong. but if any have any hints for root, or i should be looking somewhere else, a process? a tool?, a file??? anything that could lead to privilege escalation to root. help this fella out.

EDIT: oh it not a trap actually, it was right there just not familiar with that approach.

Im stuck on the Pru* exploit with the no permission error. What did you do to solve this?