Not even in yet. Can you guide pls? I'm up to
$ ssh -i hype.key [email protected] Enter passphrase for key 'hype.key': heartbleedbelievethehype [email protected]'s password: <NO IDEA WHAT THIS IS OR HOW TO GET IT>`
Tried a dozen. heartbleed,dirtyheart,sweetheart,valentine,believethehype,omg,thisisnothacking,
From there I guess you are using some sort of dirtyc0w exploit to get root? Some of the posts I've just read allude to another non-invasive, maybe easier method. what is with all the other keys and that useless MD5?
Doing this one now and stuck too. I think the user is valentine as in the user's username.
can you give me the hydra command for lernean bruteforce challenge , im stuck !!
Hi brow, i logged in ssh with user roosa on machine Dev0ops, can you help me to get a root?
Hey, i am having the same issue as Concr3ta. Can you help. Would be great. Thanks
I saw you offering to help with the Inferno challenge on the forums. I have decoded the BASE64 and ran it through a PHP decoder. I am not sure if I have the right output. Am I going the right way?
Don't write on my wall asking for hints...
Are you able to provide a hint as to how you were able to get a fully interactive shell on Nibbles?
I've got the user flag and know what I need to do to elevate to root, but just having difficulty editing the .sh file to include a reverse shell command while non-fully interactive tty.
Below is the output once I catch the shell:
USER TTY FROM [email protected] IDLE JCPU PCPU WHAT
uid=1001(nibbler) gid=1001(nibbler) groups=1001(nibbler)
/bin/sh: 0: can't access tty; job control turned off
$ /bin/bash -i
bash: cannot set terminal process group (1323): Inappropriate ioctl for device
bash: no job control in this shell
[email protected]:/$ python -c 'import pty; pty.spawn("/bin/bash")'
python -c 'import pty; pty.spawn("/bin/bash")'
The program 'python' can be found in the following packages:
I think my syntax might be a bit off? Any thoughts? Thanks.