Irked

are you all using Metasploit?
other exploit isn’t working for me

I was able to get a list of the binary files. Could anyone tell me what to look for in the binary files where I can use it to further privesc. Totally stuck in the mud now… :frowning:

Type your comment> @okipower said:

I was able to get a list of the binary files. Could anyone tell me what to look for in the binary files where I can use it to further privesc. Totally stuck in the mud now… :frowning:

google all the files, you should get 1 unusual file.

If anyone needs help , pm me !
All the best

Thanks @sillydaddy got the necessary kick in the keester to root!

Type your comment> @okipower said:

Thanks @sillydaddy got the necessary kick in the keester to root!

no worries mate …
Hack the Planet !!!

Ok, finally rooted this box but were never able to understand the .b****** file. I have the end result of the file but I cannot understand how they relate to each other. Could someone please PM and explain how to decode it?

Edit: Nevermind, found it. It is not at all obvious for someone whos never done it.

Can someone please PM with help for root? I already listed all S*** and I think I know what I need to exploit, but I’m not being able to. If someone can help!!

EDIT: I just manage to get root, but I’m not really sure how the exploit worked lol. Can someone PM ME with an explanation?

finally rooted, actually user part was easy but privilege escalation is something that can teach u a lot.

feel free to DM me for a nudge

finally rooted, for user look for clues as already given and use google to move ahead.
for root just enumerate all directories.

Hi guys just finished this one pm me if you need a nudge

nice box, got limited shell, worked out the b***p file and it’s relation to another file. Got users, stumbled around with priv escalation and finally got root.txt, could have got a shell, but it was just easier snagging the file and running :slight_smile:

@Parttimesecguy said:

nice box, got limited shell, worked out the b***p file and it’s relation to another file. Got users, stumbled around with priv escalation and finally got root.txt, could have got a shell, but it was just easier snagging the file and running :slight_smile:

believe it or not, this was one of the most helpful tips :slight_smile: thanks!

Got root, but not sure why exactly it worked. Can anyone tell me what exactly that program was doing?

rooted before dj user. Could someone please pm me the solution or a hint for the stego challenge?

Hey all, I believe that I am either overthinking the process or not enough thinking, I found the 22/80/111 but seems to be stuck at that point, I see people saying that root was a couple minutes, but for me it has been 2 days of road blocks, I could really use some assistance…please

Hello, i need some help for provilege escalation. I already run some enum ops to read process and permission info, but i can’t understand which is the process i need to elevate. Thanks.

PM me!

Can someone please reset the box? Apparently some awesome person changed the user pw. Thank you.

EDIT: Thank you!

Stuck on user, saw hints for metasploit but again stuck. I saw others saying to enum R*****D which I believe I have but unsure how to get going. Someone mind helping me out please?

Have managed to get a shell using MSF, found .b***** but struggling to find the binary needed. Haven’t managed to get root or user yet.