I am lost in the file extension bypassing
any hint for that?
I have tried with different extension and modifying the content type
but none of them work
Apart from the unauthenticated way,
I have no idea on constructing the n***.*s query
@mystory20 said:
I am lost in the file extension bypassing
any hint for that?
I have tried with different extension and modifying the content type
but none of them work
Apart from the unauthenticated way,
I have no idea on constructing the n***.*s query
Thanks in advance
same here. i can find my jpeg file with exploit script but stuck on bypassing the file extension filter … hints will be appreciated.
Are there any changes in the last hours ? I managed to upload and run a shell on this twice but after a reset, nothing seems to work. I already got user but while trying root i found that someone caused havok on the system.
I can find and call .jpg and i was able to upload .php too but stopped to work.
And of course the second I post another run actually works. Must have been bad luck with the server earlier.
I am having trouble with the upload and run shell one too. I think I know how to get around the filter, but I can’t even get a jpg or txt upload to work. Even with some time travel although the server header responses look like they match my system time anyway.
Now Im really confused. I used the REST alternative to get user and its hash (with one of the previous posts its easy). I cracked the hash and have also password. tried to log in via the lowest port and cannot. What am I missing?
Fun box! My advice is to examine the upload code and the exploit code closely, and edit as needed – might have to do some manual experimentation. After finding your shell, it’s a quick step to root! Basic, basic enum.
rooted!
Machine was quite useful, although it is very basic it taught me to actually pay attention to the basics and stop skipping ■■■■. As soon as the route to r00t was hinted I figured out exactly what I did wrong and I won’t be doing that again!