I follow the bitterman ippsec video way and developed the exploit. This exploit works in ellingson box also and gives a shell. But it doesn’t give a shell in this challenge, even locally on kali box! I get the “Got EOF while reading in interactive” error. What am i missing? PM, please:(
I understand how to pwn the binary, but i can’t understand how to pwn the remote web service:( Where should i place my payload? In the body of post request? Or in the uri in GET request? Or where? Any hints really appreciated)
Hi. Can anyone confirm that the host still works as intended?
I am getting EOF returned by the host on a very simple leak exploit that works locally.
I don’t have a VIP subscription, so I can’t start the retired challenge, but if you want, I can take a look at what you tried (and compare it to my notes/script).
For those who are doing the challenge but don’t wanna spoil themselves with writeups (like me): the library you want to use for the exploit to work is not in the database anymore. Don’t get foolishly stuck like I did. In any case, you understand what you’re doing and it’s not your fault.
Here you can get it (since this is retired content I guess I can do this):
Please, be careful. Don’t install anything, just unpack it and find the file you’re looking for.
For those who are doing the challenge but don’t wanna spoil themselves with writeups (like me): the library you want to use for the exploit to work is not in the database anymore. Don’t get foolishly stuck like I did. In any case, you understand what you’re doing and it’s not your fault.
It took 1/2 a dozen tries to find the right library but it’s there. The 2.23-0ubuntu11 didn’t work on my instance.
John Hammond and IppSec have some great videos on YouTube using PwnTools for an exploit like this. They won’t show you this exact challenge but rather the workflow.