Olympus

@3zculprit said:
One of the good machines. User is a well crafted story and then priv esc is interesting of some sort. My hints for fellow pwners:-

  1. For initial foothold just understand what’s heading your way.
  2. Use all the information gained in some way or the other. Do not be afraid to do hit and trial , that’s where you will learn and excel.
  3. Priv esc is fairly easy just googling stuffs will give you all the information needed.

PM me for nested hints. :+1:

true good box but my issue was i couldn’t get shell on first initial foothold meaning even tho i was on the right track. " reason" was latency even tho i changed the VPN from free to VIP to american server euro servers nothing would work.

" then what i did was i created new free linux Instace on AWS “amezon webservices” on london. then i was about to get shell once i got all details i start to do it localy,

Hard, box but at the same time easy because a soon you know the vulnerability then is just next next next next till root flag.

hint privsac is all over google and on here as well.