@charybdis Same here
@charybdis and @legerdemain try knocking on every door, a few of them should answer and then the rest is pretty straightforward
Spoiler Removed - egre55
got the shell. Any hint for user/root? Thanks.
I’ve used a privesc on a specific red file on a different machine, but can’t seem to get it to work now. The version matches and I have gone through a few permutations, so I want to move on, but it haunts me. If someone can under stand this vague (four obvious reasons) question, please let me know if I should keep banging my head against this particular wall.
Edit: got root. If anyone is wondering, definitely not via the thing I was referring to, but still a red file.
rooted, i really liked the box, it was not as easy as jerry but still very fun. Thanks to the creator
good to have some times a easy box to just roll with it with out having to bang your head against the wall for hours or days going to vote pro because is a inux box. <3
got root…pm for hints…
Got root. The priv escalation was a rabbit hole. Obvious once one practices the fundamentals.
need initial foothold for this machine
Got a shell, can see the file I want to read. However, every command I know to read a file in a terminal returns no output and seems to kill my shell… it doesnt disconnect just becomes unresponsive
i know what exploit to use , i see what port i need to introduction in msfconsole i discovered with nmap , i see is open …but shell don’t work ,wtf ?
it was working earlier with no issues, everyone waking up breaking box , did get the shell again after reset when i was having issues too
I have user !
Have a low priv shell, digging through the rabbit hole… have the first hint. But totally stuck
rooted ! thanks @marine
but I don’t really understand what was happening there
is it really that easy ?
If someone rooted the box and wants to discuss the solution pm me
pm for hints
I hate CTF like boxes.
The only thing that I liked about it is that you can actually get root without getting user.txt, and root is pretty easy.
My tips:
For initial foothold:
You need to follow the obvious hint that is given to you. Make sure that your nmap scan is not missing something. After that, a little bit of research (basically a google search) will grant you a shell. For user.txt, just spend a few minutes enumerating the system and you will find something useful in order to log in as a proper user.
Priv esc:
Piece of cake, basic Linux priv esc method. Once you find something interesting, see what it is trying to do and exploit it to get the root shell.
Good luck!
i think i’m overthinking privesc. just can’t get it done. meh, maybe later