Official discussion thread for University. Please do not post any spoilers or big hints.
This box is whooping my ■■■. I have found a few interesting things. But still struggling with foothold.
Ive found a vuln that allows command injection, can get it to ping and curl, but cant get a callback any tips?
What do we have to do after owning w** user?
Does it have something to do with the upload of .csr file? Please dm me for this question.
Anyone got root using intented path?
How do I get entry points where I didn’t find any useful information
I have not had a go on the box yet.
But can you chain commands with ‘|’ ‘&&’ or ‘;’ ?
Anybody got a foothold, if so please help and dm me. Thank you
Is this something I should keep investigate ?
Select a valid choice. %(value)s is not one …
not sure I’m the right place for the first step ^^’
Nice challenge…
I got foothold (rev shell) as a student… am I following another path? So far no permission for DC***c.
A hint anyone?
How did you manage to inject the reverse shell? Did you use the certificate request function? pls write me in private.
Hey, trying to get initial access. Should I integrate reverse shell in .pem certificate? Please drop me a message anyone. Thanks in advance.
good challenge
Hi Guys. I have trouble in initial access. Any hint for initial access? I think i’m in a rabbit hole… I found a Malicious Paylaod Returns but I can’t bypass it…
How do you privesc from the Martin.T user?