I am new to all this and this box is an amazing eye-opener. I learned a lot, especially enumeration and linux privilege escalation. many thanks to all the hints provided here. and a big thanks to @kbotnen . for your patience and very good hints. and of course, the user who created this box. can’t find the username (sorry about that)
i guess there is never such thing as “too much enumeration”. really enjoyed this box.
I need a nudge on accessing the m**** d*. I found creds but trying to access on the box gives me no output. I’m confused because I use the same exploit I see in the writeup I’m following but I guess the tty (if that’s the right word) is different/ less responsive.
I’ve been on this box for days now but I’m NOT GIVING UP!
I need a nudge on accessing the m**** d*. I found creds but trying to access on the box gives me no output. I’m confused because I use the same exploit I see in the writeup I’m following but I guess the tty (if that’s the right word) is different/ less responsive.
I’ve been on this box for days now but I’m NOT GIVING UP!
The good news is that, as the box is retired, spolier reporting might be a bit more relaxed now.
So, in the first instance, I’d say if you are trying to attack a database application, you’ve gone down a rabbit hole.
If you have creds, check for cred reuse on other ports.
sudo: PERM_ROOT: setresuid(0, -1, -1): Operation not permitted
TLDR: The error is happening because of the mpm_itk apache2 module
Here is a guide to solve this error, and anyway, you can solve it only when you will become root. if you want you can further dig and unerstand why this is happening, as I did. Hope this is gonna help somebody.