The second day I try to get root. Give me a hint on PM plz.
There is a ton of data over there and i dont know what i should be looking at.
Rooted! Took longer than I’d like to admit, feel free to pm if you need a hint! Thanks to those that provided me a little guidance
Type your comment> @deLjke said:
The second day I try to get root. Give me a hint on PM plz.
same boat
I tried the exploit related to cms to get the creds but after decrypting the hash it doesn’t work on the login at w******/a****. Any Hint?
Finally root, took some time to figure it out, but once you “see” the attack vector its surprisingly easy… PM if you need a hint…
Found a**** panel, and enumerated a bunch of directories (other than the usual) in /w******/ . No idea what to do next or how to find creds. Need help pls.
@Cyb3r3x3r Who said those had to be used there? Have you tried to use those in a similar place that you do apt-get from?
So now we’re changing the password on here? Is this Netmon all over again? Why people…
All of the answers are present within this forum, but ill put in my 2 cents:
User: Robots are your friend, love thy robot. Once you know what the website is running next find your exploit. If your having trouble cracking the hash, have a look at the exploit to see the format of it. (Also you don’t need john/hashcat)
Root: As everyone has said have a look at the processes, you will find something peculiar. But don’t get your nose too close to the ■■■■ hole as you can easily get stuck fucking around. Remember Padawan the PATH to success is right in front of you!
Last but not least dont fkn copy the root flag to /tmp, spend the 2 mins getting a reverse shell or just use cat.
Thanks @jkr dope box
I tried to enumerate processes running as root and everything looks peculiar.
Sometimes i wonder why we cant programmatically accomplish priv escalation.
Type your comment> @Cyb3r3x3r said:
I tried the exploit related to cms to get the creds but after decrypting the hash it doesn’t work on the login at w******/a****. Any Hint?
If you decrypt the salt and hash properly using rockyou, you will get the password. If its not working at the link u provided, see where else you can use the creds.
Type your comment> @hansraj47 said:
Type your comment> @Cyb3r3x3r said:
I tried the exploit related to cms to get the creds but after decrypting the hash it doesn’t work on the login at w******/a****. Any Hint?
If you decrypt the salt and hash properly using rockyou, you will get the password. If its not working at the link u provided, see where else you can use the creds.
yep i got that…thank you
Really struggling to get root, would appreciate a nudge via PM. Thanks
guys i did port scan and http port is closed for me and all of you talk about hints in web pages so i wonder what is the issue. in TCP i see ssh open only and udp scan is in progress. PM plz
http is open normally - at least it was for me. Box may need a reset.
ok the the writeup box is not active on VIP beta , dont know if admin knows about it.
Finally it’s done…