Irked

@drywaterv2 said:
Anyone know a good alternative for linenum that will work on this box? linenum brings out too much, so the actual solution is buried pretty deep

try the enum script of https://highon.coffee

got the reverse shell and found the b***** file and know where it is from but having a hard time getting a password from this. Can anyone give me a nudge?

EDIT: Just kidding, got user and root. PM if you need some guidance

@ALIENM0NK said:

@xdaem00n said:

@ALIENM0NK said:
Trying to exploit using msf, any clue what the LPORT should be?

The (L)port doesn’t really matter, metasploit uses 4444 by default. The RHOST and RPORT is something different in this case (especially RPORT)

I have it set, I am not using the default port I changed it, I am using Kali on VM can that be the issue?

Double check your LHOST.

Hey I cant seem to get my msf exploit working. It keeps saying cant bind to the port.
Can someone PM me so I can ask some questions?

i have absolutely no clue what this b**p file is telling me, it makes zero sense to me.

@craftxbox said:
i have absolutely no clue what this b**p file is telling me, it makes zero sense to me.

in the same I am

and people are trying to dirtycow it… still.

I already think the stego is in the b*********p file asks me for the password but what I’m using tells me that it does not support the file format

@d3ku said:
Hey I cant seem to get my msf exploit working. It keeps saying cant bind to the port.
Can someone PM me so I can ask some questions?

check if your “postgresql” service is running

@Vburgos said:
I already think the stego is in the b*********p file asks me for the password but what I’m using tells me that it does not support the file format

Maybe that file is just the first piece of the puzzle and you’re missing another one, then :).

Interesting machine. First time I actually have to use s************. Although I suspect, as others, that it’s not necessary: You can get root without.

Got it! :wink:

just rooted it … pm for any hints :wink:

@AgustinCB said:

Maybe that file is just the first piece of the puzzle and you’re missing another one, then :).

Oh man… Kicking myself for not thinking of that!

Hint - Go back to what you found during your initial enumeration.

Got user. Now trying to get root.

found the b*********p file but doesn’t make any sense. Trying to think out of the box but no luck.

@whitesails said:
found the b*********p file but doesn’t make any sense. Trying to think out of the box but no luck.

there’s a key word in that file, it’s short for a longer name, look closer

on what type of file would you use that word on… have you seen any of those around during your initial enum?

Looking at the key word but no clue…

Just got user! nice

Rooted! Getting a shell was ok with MSF, but then … the very first thing I do on a *nix box for priv-esc enum and I OVERLOOKED it COMPLETELY! Tip: Read every line of output, line-by-line, again. Easy to miss this.

@sx02089 said:
Rooted! Getting a shell was ok with MSF, but then … the very first thing I do on a *nix box for priv-esc enum and I OVERLOOKED it COMPLETELY! Tip: Read every line of output, line-by-line, again. Easy to miss this.

good on ya! Still struggling with priv esc, probably missing something from the enum as you mention…

Anybody have some time to help? I’m looking to get root. I think I’ve found something that’s not usually on Linux machines (not an easy task for me yet), but I’m worried I’m creating my own rabbit hole :).