~Anyone around who could spare a hint on how to get access to the libc (or any binary file at all)? Currently stuck at crafting a proper chain, but trying to retrieve anything that is not a text file produces an error ~
Happy to help people but PLEASE explain your problem in as much detail as possible! If you say vague things like "It's not working", I cant help. This isn't Twitter so my DMs are always open.
> @HomeSen said:
> Well, to be fair, it's a quite subtle issue. And many people still don't know that kind of attack (even though it already is quite old)
whenever i see critical functionality (i.e. protecting confidentiality, integrity, availability) implemented *by hand* (as in contrast to using a well tested and verified library) some alarm goes off
Sorry to see it go. One of my all time favourites. Took me weeks to finish, but I learned so much.
@TazWake said:
> Sad to see this box seems to be retiring at the weekend.
>
> It is a hard one, I'd suggest if you hadn't already made progress on it by now, it probably isn't worth starting.
Stuck on elevation of privilege. Just saw this is retiring so trying to get it before it does and wish I noticed earlier in the week. I have a shell at the moment and looking into the next steps. Happy to take a nudge. Just getting a shell took a while.
Stuck on elevation of privilege. Just saw this is retiring so trying to get it before it does and wish I noticed earlier in the week. I have a shell at the moment and looking into the next steps. Happy to take a nudge. Just getting a shell took a while.
Read the source code and work out how to exploit the binary, then exploit it.
If you are good at binary exploitation this might be easy for you. I found it really, really challenging though.
Happy to help people but PLEASE explain your problem in as much detail as possible! If you say vague things like "It's not working", I cant help. This isn't Twitter so my DMs are always open.
Comments
> I GOT THE QUERY RIGHT HELLLLL YEAAA!!!
Yayy!!! 😂🤣
A Chemist doing Penetration Testing - Check the Story here: BinaryBiceps
*Spoiler Removed*
Always happy to help, DM me if you need anything!
Link to Profile
Anyone willing to help me with the s***d part? I have execution but can't figure out how to get shell or do it without
Finally rooted, but it was really hard.
This doesn't make sense... the user is prevented from writing over the buffer. Is this a rabbit hole?
Always happy to help, DM me if you need anything!
Link to Profile
Hi, could someone dm why my generated cookie isn't working I know the attack I need to perform but nothing seems to work.
Type your comment> @mohabaks said:
I'm in the same spot... Swear I'm doing everything right and have tried the various options based on the source.
Edit: NVM had it right. silly mistake on my part...
~Anyone around who could spare a hint on how to get access to the libc (or any binary file at all)? Currently stuck at crafting a proper chain, but trying to retrieve anything that is not a text file produces an error
~
NVM, I first needed to embarrass myself
GREM | OSCE | GASF | eJPT
Sad to see this box seems to be retiring at the weekend.
It is a hard one, I'd suggest if you hadn't already made progress on it by now, it probably isn't worth starting.
Note: https://www.nohello.com/
Happy to help people but PLEASE explain your problem in as much detail as possible! If you say vague things like "It's not working", I cant help. This isn't Twitter so my DMs are always open.
No way, just got the admin secret. They can't retire it !
Luckily, I managed to finish that one 2 days ago
I really enjoyed that box and the fact that you (usually) won't get a shell until you're root
GREM | OSCE | GASF | eJPT
same here.
i really enjoyed all of the (different) challenges that machine provided. especially that last part which i have never done before.
thanks @sokafr for an absolutely amazing machine
i had the impression you were working on another machine
Can't figure out how to trick that damn signature check. The code looks solid to me.
Bruteforcing the missing part seems a bit ambitious.
Well, I needed a break after few hours feeling lonely on that open source social network, talking to soul less people ! But I sure will get back to it
ouch! never trust homebrewed "security" solutions (especially when it comes to ... that subject you were talking about)
@xaif7aLe said:
Well, to be fair, it's a quite subtle issue. And many people still don't know that kind of attack (even though it already is quite old)
GREM | OSCE | GASF | eJPT
> Well, to be fair, it's a quite subtle issue. And many people still don't know that kind of attack (even though it already is quite old)
whenever i see critical functionality (i.e. protecting confidentiality, integrity, availability) implemented *by hand* (as in contrast to using a well tested and verified library) some alarm goes off
@TazWake said:
> Sad to see this box seems to be retiring at the weekend.
>
> It is a hard one, I'd suggest if you hadn't already made progress on it by now, it probably isn't worth starting.
Yeah got user!
@xaif7aLe and @HomeSen you made some cryptography lectures come back to my mind.
Now, what I found is intimidating
Since so far I have just got remote read access I hope that "Everything is a file in Linux" stands here
go back to you nmap result to know which one.
Stuck on elevation of privilege. Just saw this is retiring so trying to get it before it does and wish I noticed earlier in the week. I have a shell at the moment and looking into the next steps. Happy to take a nudge. Just getting a shell took a while.
@kedetzer0 said:
Read the source code and work out how to exploit the binary, then exploit it.
If you are good at binary exploitation this might be easy for you. I found it really, really challenging though.
Note: https://www.nohello.com/
Happy to help people but PLEASE explain your problem in as much detail as possible! If you say vague things like "It's not working", I cant help. This isn't Twitter so my DMs are always open.