Irked

Finally got root, directly went for root instead of going for user and then root
Nice box!

hint for root: just look for unusual binaries

GOT ROOT PING FOR HINTS

Lolz once root system and get flags, just remember to remove your poc or footprints. Make clean for next tester.else it is very irritating .

Type your comment> @Naerz974 said:

I have owned the machine. The way I go to get root & user it’s weird. I compare it to the wirte ups available and no one did like me. Someone who ownd the box can pm me to discuss of it ? :slight_smile: Thanks in advance!

Where you got write-up

Can’t seem to get the metasploit working even though I’m certain I’ve used the correct options can someone PM me with advice?

I have user. I have enumerated some processes running as root and have a theory to get to root, but my ideas haven’t translated to any pwnage. Can someone DM me a nudge?

Going for root: found something weird running that had a name that made sense wrt to the username. There’s an privesc exploit for it, but it says I don’t have the permissions…

The look for something unusual sounds like a good plan, but after doing LinEnum I have pages of stuff that looks unusual to me :frowning:

Might have to ask for hints on this one…

I hate to ask for help but if someone could spare a minute for me to see if what I’m doing should work? I am working on the i** service but the stuff I’m trying is failing and I thought for sure I had it figured out.

Got it. This thingy demanded no exploits from me at all, just meticulous enumeration. Notice the unusual. If only other ones were so straightforward)))

Type your comment

Got root. nice box. Not so sure about what exactly the file does but i’m working on it.

Got root. nice box. Not so sure about what exactly the file does but i’m working on it.

Any help with this box i have exploited the service !! but no clues what to do next . someone please help me .

anyone here to help me with irked?
i enumerated r******d service. used the necessary exploit but stuck with image.

Rooted this box.
For folks who haven’t , don’t overlook enumeration. Important information is hidden in plain-sight.

For remote access, I used metasploit module.
Anyone got remote access without metasploit ? If yes, please ping me.

This is the most ironic box ever. I spent longer on this box than others even though the methodology for rooting other boxes is much more difficult.

I believe the name ‘Irked’ is supposed to come from the idea that there are some proc names that look like they should be ideal targets for priv esc, then you run the script and it just dies.

Then after hours of enumeration I just ran one line and got root.

If anyone is having trouble getting root I’m sure you can get it after reading this! Stop looking at hard stuff and imagine it being as easy as the remote exp you used to get shell.

ROOTED !!

PM for hints

Rooted!

Real learning experience on how handling your enumeration.

Feel free to PM me for hints!

finally rooted! still not managed to esc priv to root mind, but ill come back to it, absolutely done my head in this… learned a lot though!..