Hey guys, just got user access, trying to use a m**** module on w***n but i’m getting a “cookie error” and “no session was created”. Am i on the right way ? I don’t mind some hints :s nvm, got it working. hint for this error: don’t forget ssl like i did…
ROOTED !
pm me for hints/nudges
Thanks, @Nexe That “don’t forget ssl” really helped me big time, got it right away.
@lhh4sa said:
I cannot for the life of me find the file needed for gaining user access after gaining the initial foothold. Pretty sure I am blind and its staring me in the face.
Any help would be greatly appreciated, trying to root my first box.
just enumerate it bro real hard maybe you just missed it
Hey guys, just got user access, trying to use a m**** module on w***n but i’m getting a “cookie error” and “no session was created”. Am i on the right way ? I don’t mind some hints :s nvm, got it working. hint for this error: don’t forget ssl like i did…
ROOTED !
pm me for hints/nudges
Thanks, @Nexe That “don’t forget ssl” really helped me big time, got it right away.
Hey! Thanks for the hint. But I haven’t been forgetting the SSL, got the creds required for the exploit (M***, c***********), figured out that we have the pk* u**** privs for our user M*** but the exploit ends with Exploit completed but no session was created.
Any pointers on where I might be going wrong?
EDIT: Got user. For root → Still the same problem. Any pointers on what could be going wrong? I am using the w*****p********* exploit. SSL set to true. Not working man. Really frustrated at this point.
Got root before user. This machine is pretty difficult and frustrating for an easy one. Nothing worked out of the box and I had to carefully prepare each exploit and then find out why it doesn’t work as it should.
Hi, i’ve just finished this machine, thanks @OddRabbit and @misthi0s for the help at the foothold, if anyone need a nudge to get user or root just PM me
Thank you very much @TheCyberGeek - it was a good learning curve for me
Also a thank you to @rholas and @J0hnD03 for the nudges
Foothold: Plenty on the forum but read the ‘An Ethical Hacker’s Cookbook.pdf’ and pay attention to the images + text (they are not always the same…)
User: Good juicy backup file you can have a look at and ask SS*John to help you out followed by his friend John, together they can rock you with a solution.
Root: As everyone keeps saying: CVE, I bummed out a little there on the listening address
Make sure to thoroughly nmap/scan/info gather at first to find a foothold. You should see more than just 2 low number ports open. Google around, this was my first time working with the protocol and it was quite involved.
Once you have your foothold, identify users on the machine and dig for any files they own in the file tree. The file will give you information to escalate to user. Don’t get thrown off that file itself may not be used other than to recover creds.
Root was rather easy. I love metasploit.
Good luck, PM or Valor in Discord if you need anything.
How many time John needs to finish his job? I started it 3 hours ago and he is still working…
I did a stupid mistake…
bro just use the most common wordlist that you can find like rkyo*.txt
i did a mistake with other file and not the correct one, I solved and john works correct with rkyo*.txt. i got the user flag, now i’m working for the root.
Thanks.
edited - rooted, a bit dislike about the root, I used msf. did somebody use a different approach? If yes, can you kindly PM me?
I quite liked this puzzle, I think it was perfect for me as a first box. Although I must say that the ik file and fact that it was possible to s into the r**** user felt a bit artificial to me. At least On Ubuntu, by default I get nologin for the user r**** and I can’t see why would anyone change that.