If anyone is interested in sharing, I’d love to know about the poison way with creds. I know how that would be done, but I got root without going that way, so I guess there are two ways to get root. If you did it the poison way I’d love to talk.
If anyone else is stuck and needs some direction, I’m happy to help. Feel free to PM me.
If anybody knows about any different ways to receive shell when you are root or user that would be awesome what an amazing box and absolutely new skill with this one
Anyone care to pm me some details on decrypting the file? Got most of it I think would like to know if I’m way off before I bury more time. I figure, File > B***** > A***** >profit. But stuck with the last step for some reason.
Jeez I’m baffled here… Crossed that river to quench my thirst, logged in to console and went through all the data but nothing to get into root… Used same method as previous box forwarding through tunnel but maybe I’m not privileged to view the data I want?
@3s073r1k said:
Jeez I’m baffled here… Crossed that river to quench my thirst, logged in to console and went through all the data but nothing to get into root… Used same method as previous box forwarding through tunnel but maybe I’m not privileged to view the data I want?
search for mannual exploitation of known vulnerability relates to console on google
@3s073r1k said:
Jeez I’m baffled here… Crossed that river to quench my thirst, logged in to console and went through all the data but nothing to get into root… Used same method as previous box forwarding through tunnel but maybe I’m not privileged to view the data I want?
search for mannual exploitation of known vulnerability relates to console on google
Has anyone else had a problem with a php reverse shell? I leave netcat listening, and I get a connection, and then it closes immediately. On the web front, it says connection refused.
@sh3lbst3r said:
Has anyone else had a problem with a php reverse shell? I leave netcat listening, and I get a connection, and then it closes immediately. On the web front, it says connection refused.
So I got the file cracked using my own trivial script like others have done, it seems. But what is wrong with the github tool b*********-s*****-o******? Seems to be the right tool for the job, and the syntax is simple? Not that it is a very big deal, but maybe someone would be kind enough to tell me in private a syntax that allows the tool to work? Might be nice to know.
Rooted. Very interesting box. Looking back, it ended up not being as difficult as I thought it was or was treating it to be. But it can cause some overthinking. If anyone needs a push in the right direction, just PM me.