Official Time Discussion

Official discussion thread for Time. Please do not post any spoilers or big hints.

«1345

Comments

  • Hummm...

  • :neutral:

    LMAY75
    Always happy to help, DM me if you need anything!
    Link to Profile

  • Such irony Sp3eD got first bloods on time. :D

  • Last login: Sat Oct 24 21:38:38 2020 from 10.10.14.xx
    [email protected]:~# id
    uid=0(root) gid=0(root) groups=0(root)

  • I think this should be an easy box, lol. Very easy.

    jkana101
    OSCP | Sec+ | MCSE | VCP | CCNA

  • Spoiler Removed

    Scorpion4347

  • Rooted! Easy box, indeed.
    User: It's so 2019
    Root: it repeats itself, so just listen and change

  • Rooted.
    Thanks @Termopan for the little hint of a change on the way to user ..
    Root is straightforward

  • Rooted. for user you need to find a specific vuln relating to an error message. Root is a piece of cake.

    alt text

    • Rooted, thanks for this box.

    • Do a lot of enumeration to get a shell, and the root part is relatively straightforward.

  • It's an easy box, the error message is a great clue to continue. Understand how it works and test it.

  • edited October 25

    This is the oddest thing, I got user real fast last night and went to bed cuz it was late. Come back this morning and I can't get the page to grab the payload off my server with the exact same commands.

    The weirdest part is it is connected, like if I kill the server it spits out an error message on the page saying the pipe was broken but it never pulls the shell off my server. Just sits there spinning for eternity.

    Edit: appears to be an issue on my end

    LMAY75
    Always happy to help, DM me if you need anything!
    Link to Profile

  • Rooted. If you need some help, DM me.

    user: java Validation?? search some CVE
    root: amazing ez gg

  • I don't understand how people found the vuln so quickly. To be honnest, I went over it, but i had easily 4 or 5 other things to check, so i dismissed it as soon as it didn't work and checked the other.

    Only when i saw the hints did i think that I needed to recheck every single one of those carefully, but without knowing it it's a different thing. Once you know the hints it's indeed easy but without the hint you can easily fall into rabbit holes and mess around with things that are somehow realted to the vulnerability which won't work.

    Root is definitely easy and a "classic" of privesc for those who are learning privesc.

    lebutter
    eCPPT | OSCP

  • Type your comment> @lebutter said:

    I don't understand how people found the vuln so quickly. To be honnest, I went over it, but i had easily 4 or 5 other things to check, so i dismissed it as soon as it didn't work and checked the other.

    Only when i saw the hints did i think that I needed to recheck every single one of those carefully, but without knowing it it's a different thing. Once you know the hints it's indeed easy but without the hint you can easily fall into rabbit holes and mess around with things that are somehow realted to the vulnerability which won't work.

    Root is definitely easy and a "classic" of privesc for those who are learning privesc.

    My experience was exactly this. Spent all afternoon knowing the weak point but digging through the many possible CVE's and dead ends before landing on the one that works. It boggles my mind how quickly people pinned down the right one but I'm sure experience plays a role.

    elseif

  • Rooted and it was a fun box

    Why 50 53R10U5

  • Type your comment> @elseif said:

    Type your comment> @lebutter said:

    I don't understand how people found the vuln so quickly. To be honnest, I went over it, but i had easily 4 or 5 other things to check, so i dismissed it as soon as it didn't work and checked the other.

    Only when i saw the hints did i think that I needed to recheck every single one of those carefully, but without knowing it it's a different thing. Once you know the hints it's indeed easy but without the hint you can easily fall into rabbit holes and mess around with things that are somehow realted to the vulnerability which won't work.

    Root is definitely easy and a "classic" of privesc for those who are learning privesc.

    My experience was exactly this. Spent all afternoon knowing the weak point but digging through the many possible CVE's and dead ends before landing on the one that works. It boggles my mind how quickly people pinned down the right one but I'm sure experience plays a role.

    Yeah it was blooded in 8 mins, 51 seconds.

    alt text

  • All logical, spent more time using the wrong command over and over again than getting root.

  • Like everyone says, it is more an easy box than a medium one but cool if you start doing boxes.

    User : CVE
    Root : it repeats

  • Rooted, fairly easy!

    aimforthehead

  • rooted. no clues to add - there is enough above. thanks for the cool box @egotisticalSW and @felamos.

  • Rooted! First time I root machine alone (with some hints from the guys in the forum), If someone need help, feel free to DM me with what have you tried.

    Just new here, but Ffeel free to DM me with questions (but mention what have you tried).

  • Anyone able to give me a nudge. I think i have found what i need but i cant see to find the right CVE. HELP!!!

  • could someone please reach out to me. I do have an exploit and I do get a connection back to my JR**L******* but i still do get a validation error (no context given) and my payload does not execute. I am not very familiar with the whole des********** topic and still dont fully understand how it works. so some advice or a link to a more detailed description would be highly appreciated. It also still might be that I am deep in a rabbit hole. so any advice is highly appreciated. thx. for more details on what I have been doing please pm me.

    zaphoxx

  • @zaphoxx i will PM you ..

  • Hi there, could anyone help nudge me towards getting closer to the initial shell, i'm pretty sure i've found the right exploit and CVE but I can't seem to get a reverse shell. I'm also not very clued up on J*** or Des*********** vulnerabilities. Any help would be much appreciated, thanks guys :)

  • While i really like the entry point technology (and exploits related to this kind of features), this box does not really make you work for it.

    This is a nice first time / beginner box for this kind of vulnerabilities.

    People gave more than enough hints imo.

  • @DonTheBomb i PM you ...........

  • @MariaB , thanks a lot for reaching out.

    zaphoxx

Sign In to comment.