Irked

@charybdis Same here

@charybdis and @legerdemain try knocking on every door, a few of them should answer and then the rest is pretty straightforward :wink:

Spoiler Removed - egre55

got the shell. Any hint for user/root? Thanks.

I’ve used a privesc on a specific red file on a different machine, but can’t seem to get it to work now. The version matches and I have gone through a few permutations, so I want to move on, but it haunts me. If someone can under stand this vague (four obvious reasons) question, please let me know if I should keep banging my head against this particular wall.

Edit: got root. If anyone is wondering, definitely not via the thing I was referring to, but still a red file.

rooted, i really liked the box, it was not as easy as jerry but still very fun. Thanks to the creator

good to have some times a easy box to just roll with it with out having to bang your head against the wall for hours or days :smiley: going to vote pro because is a inux box. <3

got root…pm for hints…

Got root. The priv escalation was a rabbit hole. Obvious once one practices the fundamentals.

need initial foothold for this machine

Got a shell, can see the file I want to read. However, every command I know to read a file in a terminal returns no output and seems to kill my shell… it doesnt disconnect just becomes unresponsive

i know what exploit to use , i see what port i need to introduction in msfconsole i discovered with nmap , i see is open …but shell don’t work ,wtf ?

it was working earlier with no issues, everyone waking up breaking box :stuck_out_tongue: , did get the shell again after reset when i was having issues too

I have user ! :smiley:

Have a low priv shell, digging through the rabbit hole… have the first hint. But totally stuck

@illwill after reset exploit is working …maybe more reset take over the box

rooted ! thanks @marine
but I don’t really understand what was happening there
is it really that easy ?
If someone rooted the box and wants to discuss the solution pm me
pm for hints

I hate CTF like boxes.
The only thing that I liked about it is that you can actually get root without getting user.txt, and root is pretty easy.

My tips:

For initial foothold:
You need to follow the obvious hint that is given to you. Make sure that your nmap scan is not missing something. After that, a little bit of research (basically a google search) will grant you a shell. For user.txt, just spend a few minutes enumerating the system and you will find something useful in order to log in as a proper user.

Priv esc:
Piece of cake, basic Linux priv esc method. Once you find something interesting, see what it is trying to do and exploit it to get the root shell.

Good luck!

i think i’m overthinking privesc. just can’t get it done. meh, maybe later