I know where to upload my shell, finding it and executing it is the problem. The exploit to find it isnt working.
@Malone5923 said:
I know where to upload my shell, finding it and executing it is the problem. The exploit to find it isnt working.
same boat
And @buckley310 gets first blood. Congrats man.
Cant get passed the C**F check when uploading the shell.
Edit: Whoops, forgot a port in my scan as I went straight to port 80 lol.
brb kms if it was about using the “right” wordlist
EDIT: user is tricky.
I managed to find whatever I upload… but I’m starting to have a feeling it is a rabbit hole…
Sooo… is it?
This box is surprisingly tricky! Love it!
@23Y4D said:
I managed to find whatever I upload… but I’m starting to have a feeling it is a rabbit hole…
Sooo… is it?
Same here…thought I could trick it to upload a specific file type but no luck…
Did anyone get code execution?
Rooted. Loved the box. Hints:
- No brute force is necessary
- It is possible to get RCE (hard), but much easier to find creds
- You have to partially guess a username
The N***.JS is the way to go?
I didn’t need that. But seems others used another path and did need it.
Ok, so i have been sitting a while trying to get a shell. Could someone PM me so i can find out if my method is not a waste of my time? (Don’t want any spoilers) Cause i feel my method is the way to go.
are we supposed to get creds? cause i seem to be failing on that
also the unauthenticated exploit is not working (maybe modification is needed?)
Could I get a hint please? Ticket portal or JOSN page?
You can use one or the other. There is at least two ways you can go.