20 minutes to go, looks interesting. Anyone else see this as Linux when it was in “Unreleased”?
Lest go xd
Can’t find anything!
Unable to connect
I found a lot of users.
Well, that was an easy user pwn
*Spoiler Removed
Think someone have tried to be funny and change the password…
Easiest user I’ve ever done.
@extincted said:
Think someone have tried to be funny and change the password…
Think more about what you’ve seen, and what it indicates about the system.
edit: solved. removing initial post.
user.txt
so easy
Is ke**********g the way to go?
Type your comment> @Ma1ware said:
Is ke**********g the way to go?
No need for that, at least for user
HI guys, can you please give me a hint on where to go to get user on resolute, I tried searching for exploits on the services that nmap found, but nothing worked.
Thanks
I may have spotted the root vulnerability, could be a rabbit hole
I have a bunch of usernames but most options require passwords. The only option from I****ct without password returns nothing. Also is 445 a rabbithole for user?
Type your comment> @tang0 said:
I have a bunch of usernames but most options require passwords. The only option from I****ct without password returns nothing. Also is 445 a rabbithole for user?
No. try harder
Type your comment> @tang0 said:
I have a bunch of usernames but most options require passwords. The only option from I****ct without password returns nothing. Also is 445 a rabbithole for user?
Check the output from your enumeration process line by line. Since you have the usernames, I guess you probably didn’t see it, due to some error messages.
Got into user 2, the hint makes it sound difficult.
Edit: On the edge of root now, interesting vuln.
Built my root payload, now to get it executed right