dude nice link man thank you! you got some nice staff on your dropBOX OSCP ill be doing in 4 month… just going for AWS Cert next 1 so been busy with that.
ill PM regarding about OSCP ether ways excellent file thanks for sharing
Thanks man - I usually add new resources everyday! - Enjoy
Rooted!! - Special mention to @raulcpop for the pointer! If anyone needs help my PM’s are open.
Hints :-
Crete - Do not overthink… Play around with burp & google Olympia - Also do not overthink - Once you find the file you have everything you need to progress… Rhodes - Enumerate enumerate… If you run into issues it will be because nameservers… editing /etc/resolv.conf on your local box will help you Priv Esc to Root - Do some Googling on what’s on the box! You will get there eventually.
got root!
Overall a good machine. Pretty forward hacking/ctf.
The only thing I really struggled was waiting for the cracking and the educated guessing in Olympia…
if someone needs help - PM me
dude nice link man thank you! you got some nice staff on your dropBOX OSCP ill be doing in 4 month… just going for AWS Cert next 1 so been busy with that.
ill PM regarding about OSCP ether ways excellent file thanks for sharing
Can i have the dropbox link of oscp
I will pass my oscp exam soon and any advice to pass the exam is wonderfull
for those who are from Australia india nz etc just letting you know it kinda impossible to get shell on this box the first shell i am talking not after…
any way i was able to get shell using instant i set up Europe threw AWS…
good luck to every one who keep trying to shell on this box. a mean you could be 100 on the right track but the latency just make time out. unless you are close to the actually server.
@3zculprit said:
One of the good machines. User is a well crafted story and then priv esc is interesting of some sort. My hints for fellow pwners:-
For initial foothold just understand what’s heading your way.
Use all the information gained in some way or the other. Do not be afraid to do hit and trial , that’s where you will learn and excel.
Priv esc is fairly easy just googling stuffs will give you all the information needed.
PM me for nested hints.
true good box but my issue was i couldn’t get shell on first initial foothold meaning even tho i was on the right track. " reason" was latency even tho i changed the VPN from free to VIP to american server euro servers nothing would work.
" then what i did was i created new free linux Instace on AWS “amezon webservices” on london. then i was about to get shell once i got all details i start to do it localy,
Hard, box but at the same time easy because a soon you know the vulnerability then is just next next next next till root flag.
hint privsac is all over google and on here as well.
got root ! priv esc part was really fun. It takes 10 hours to get user.txt and 1 hours to get root.txt. Worship to the Gods and Creator of the Machine !
Could anyone give me a hint on what im doing wrong for opening the door to hades? I think im on the right path, so just a simple “check my command, if its the right way to do it” would be great.
@raystr said:
Could anyone give me a hint on what im doing wrong for opening the door to hades? I think im on the right path, so just a simple “check my command, if its the right way to do it” would be great.
Same here, seem to be stuck at opening the portal. I know I need to use a certain technique but have no idea how to follow up on it. Anyone mind giving any hints?