Hint for HELP

I too am among the weary travelers who need ‘help’ to get a foothold. Have attempted the Null-Byte method but fear I may have have stumbled down a ravine and sprang my brain. Please send ‘help’ my way fellow pilgrims…

I m able to upload my exploit but not sure how to call it back, this is where I am stuck. I am using Pentest monkey reverse shell. no sure what next ?

Finally rooted this box.

I must say user had me scratch my head for a few good hours. Mostly my main issues I was providing a wrong parameter.

Tips for User:
Take the high approach. Read what it asks from you. Get credentials and see where you can use them. Find general exploit and run shell. Don’t trust every error you get. Account for time.

Tips for Root:
Basic enumeration. Search common exploit. Run it and pwn it.

Thanks for the nudges from @Haxys towards finding user.
Thanks for the small push from @PavelKCZ to overcome my frustration and root it

Feel free to PM me for hints/nudges.

Well, I’m still at it…try harder right, haha. I have tried to rewrite the script and have made little progress on this box. Could really use some advice at this point. I know it will be something silly I overlooked. Time has been checked, and accounted for we are good. Creds have been found, used to log in, we are good. Scripts have been edited for specific purposes, should be good. NC is doin’ it’s thing, we are good. User accessed…not so good : (

Special shout out to @AndreiPintea for the gentle push in the right direction. PM me if you need on as well ; )

Lol! I just laughed to myself when I got root. It took too much time for me. I was overthinking about it.

Hint for root: Just go with basics. Enumerate the system. Maybe you can use a tool for it. Try different exploits if your current exploit is not working.

Hello, I am able to upload a payload, but not sure how to call it. Can anyone give me a hint?

Thank you for this amazing one. I learned a lot. The user was very interesting for a beginner like me.

Hey everyone, my third box on here. Currently I found 2 ways, Since Im not super deep into the javascript, I went with first method, I created 2 different shells, I did a bypass but not sure if Im getting the results Im support expect. When you upload you file for the ex****, does it just redirect you back to the main page or do you get some kind of a ticket number and a way to access your upload. If anyone can provide some help in that area, that would be great.

to add sorry for bad grammar, and I think it works because I don’t get the error for the upload but it just redirects back to the main page.

Just got root, if you’re stuck on what to do with your upload while getting user you’re going to want to do some more google-fu to find the next step (there’s some source code digging for a service that can point you in the right direction). Definitely a fun box.

I was able to get user and root.

But I don’t know what the high port (3XXX) is for.

I did query it and obtained the creds (email, and hashed pass) but not sure what to do with them.

Appreciate if anyone can shed some light.

Type your comment> @ekh said:

I was able to get user and root.

But I don’t know what the high port (3XXX) is for.

I did query it and obtained the creds (email, and hashed pass) but not sure what to do with them.

Appreciate if anyone can shed some light.

Basically with those creds you can access easier the low port. From there it is the same route

Not too bad, felt like a fool at the start trying to get user. Someone mentioned it, look at the source code and notice what happens to files that are blocked/failed.
Root was too easy.

I’m curious about port 3***, DM if you went that route, supposedly there’s some creds…?

gah! I got user pretty quickly, but this privesc being easy is beyond me haha

edit: got root - I’m a fool

needed a kickstart can anyone PM me please i got su***rt page i dont know what to do next

I am at a loss trying to bypass the file upload filter. I found the creds using the higher port, and is able to login as a user. I can upload files as jpeg or txt and view them. Tried the null byte methodology and other bypass methods. None are working. The file is served up as a jpeg or txt for downloading as opposed to execution!! Any hints specifically on file upload are much appreciated!

Any tips on how to upload the file? I am always getting an error

Type your comment> @R3S3T said:

Any tips on how to upload the file? I am always getting an error

Look at the source code and answer me this: What happens to the files that throw an error? What does the code do with them? Just take your time to understand the code.
DM me if you still can’t get it.

hi, one of you has the next problem, i get it flag of user.txt, but now when upload de script… this not work , i probe one more time and i change of the server, but the problem persit, thanks.

rooted!, i great machine, well the key is a enumeration and you can see very good the paths…