Learned something with this box. As everyone else has mentioned plenty of hints in this forum.
User: Pretty straightforward if you thoroughly NMAP and search for exploits on the services that show. Once in the box ENUMERATE. There is an interesting file with instructions.
Root: Use well-known linux priv-esc guides. You’ll find a file that gives an interesting output. This is where I got tripped up. THINK ABOUT the output and what it’s doing. THINK about who it’s running as. Then THINK about how you can help it accomplish it’s goal.
I, ummm, well I got to root… from low priv shell so I have well and truly missed what I am supposed to do on this box. Just reading these comments tells me there is some steg in here… totally missed it
I’m gonna have to go back and start again and see what I missed lol
Just rooted; for anyone trying privilege escalation to root, I believe it was already said it’s a particular binary. Make sure to carefully read all its output, i didn’t notice the thing at first then went on to the next…
No need to search for exploits on the web to execute on the machine.
Fot the steg, you get one part right in your face when you start, then the other one after the low priv shell. Nothing mind blowing though, if you got root anyway just skip it, or do some steg challenge if you really want.
Found the user but don’t know what to do know. I know everyone says enumerate but that’s not that helpfull. Apparently I am looking for an s*** priv esc but never done one and i also cant find a file with the s*** bit set.
@veepn said:
Ive got the low priv shell, found the *****p file and got the interesting contents from it. Now I just am not sure what to do with that info.
You got the second piece of that puzzle, now go back to one of the first thing you (probably) did when you started on this machine to get the first piece.
@Calvo said:
Found the user but don’t know what to do know. I know everyone says enumerate but that’s not that helpfull. Apparently I am looking for an s*** priv esc but never done one and i also cant find a file with the s*** bit set.
any help/tips?
You can’t find any? Like at all? Are you looking for it manually?
Don’t wanna sound rude, but you at least gotta know basic linux commands before trying to hack linux machines. Read the find manual, you can filter for file permissions.
@veepn said:
Ive got the low priv shell, found the *****p file and got the interesting contents from it. Now I just am not sure what to do with that info.
You got the second piece of that puzzle, now go back to one of the first thing you (probably) did when you started on this machine to get the first piece.
I got the steg info, just not sure what to use that for. I am not sure I guess what service I should be attempting to login to with that information
If anyone can DM me a hint to help me finish, I know I got all the right stuff for root but cant seem to figure out what to do with it. I found the file that doesnt belong. Its looking for a directory thats not even there. If I make it, what am I suppose to put inside of it? Or am i going the complete wrong direction.