kotarak

Likewise I’m quite stuck, same place with the “try harder” filter and enumerated everything I can think of (minus this mysterious ‘tetris’ game I’ve seen mentioned). But I can see the server-status however nothing stands out as important or useful. Any direction to head in?

I got an initial webshell but couldn’t escalate to an interactive shell. I suppose we need it to switch user by using the extracted password?

Rhadow - there are two passwords that can be extracted. Try again, try them both.

hey folks would love a nudge in the right direction here. found the 2 locations and was trying a few fuzzing fir dir trav and still running a discover scan on burp to see if i’m missing anything or if i can find more files… dirb didn’t help that much… and most of my attempts in path=xxx i get try harder… can i get a push please? thanks!

@zelsonm1 said:

@zelsonm1 said:
hi everyone, I’m having a hard time trying to bypass the ‘try harder’ filter. Already read a lot about LFI/RFI but can’t find a way in. Someone can send a tip?

I found the way in, thanks for pointing the right direction guys :wink:

I’ve trying bypass the ‘try harder’… i found others ways instead fXXX// like sxx// or fxx// but in all cases only read the files content, not execute them. Could you tell if you got webshell by this way (setting right xxx for path)?

Hi,
Enumerate well the application you see in the high port. Use the right requests. Think which pages you would check in an apache installation to get information. When you find the right page you will find something interesting that will guide you to the next enumeration step. This is a multi-step box in all phases.

@kubanu said:
Hi,
Enumerate well the application you see in the high port. Use the right requests. Think which pages you would check in an apache installation to get information. When you find the right page you will find something interesting that will guide you to the next enumeration step. This is a multi-step box in all phases.

thanks… I got the idea :slight_smile:

This box is a total brainfuck for privesc. I can see some interesting traffic requests that might be exploitable to get final root but that requires a privileged user which is where I am, trying to privesc passed the user after doing some password cracking. Any nudges folks? I’ve enumerated the ■■■■ out of the logs, services, etc. A redundancy service looked promising but…

hi everyone, I’m having a hard time trying to bypass the ‘try harder’ filter. Already read a lot about LFI/RFI but can’t find a way in. Someone can send a tip?

@altoarun said:
hi everyone, I’m having a hard time trying to bypass the ‘try harder’ filter. Already read a lot about LFI/RFI but can’t find a way in. Someone can send a tip?

you don’t need look outside the box… check carefully what you got from enumeration

@decart said:
Rhadow - there are two passwords that can be extracted. Try again, try them both.

2 passwords? are you sure?

and what one should do with this passwords? I am stuck…

Any hint/nudges/tips/suggestions for getting root? I found a bunch of pieces but I can’t get root

@DigitalSamurai said:
Any hint/nudges/tips/suggestions for getting root? I found a bunch of pieces but I can’t get root

Right there with you. This is a tough one. Every area I think may lead to it is missing a piece required. #rabbithole

@DigitalSamurai said:
Any hint/nudges/tips/suggestions for getting root? I found a bunch of pieces but I can’t get root

Same boat.

Actually… waiittt aaa mminnnutteeweeeeee

yeah I’m stuck too. Got 2 Passwords. But they don’t seem to be working with the associated accounts. So I’m stuck without a clue again :confused:

@rad4day said:
yeah I’m stuck too. Got 2 Passwords. But they don’t seem to be working with the associated accounts. So I’m stuck without a clue again :confused:

try again… the password works for me

anyone nows if to take root in kotarak i need bypass the S*A* from processor?

Anyone PM me… I have user. I think I’m on the correct path to root. Thanks.