Smasher2

Type your comment> @keithschm said:

Type your comment> @n0x90 said:

dzonerzy dropped a hint - I’m sure he won’t mind me sharing: user: admin, password beginning wth C. common.

thanks dzonerzy :heart:

sorry make that an ‘a’, no its DEFINITELY A ‘C’ rockyou baby

Is this true, been rocking it for a long time now…

)It is true but grep for “c” (lowercase c)

Can anyone PM some hints on dissembling the ***.*o file. I am using ghidra but I am new to it and cant seem to find what I am looking for

Root was freaking awesome! Never had to do that before and it was so much fun creating a working exploit! :smiley:

Loved it <3.

what tool did everyone use for the initial brute, seems to be taking forever using metasploit module even using the hint in this forum about grepping “c”

Type your comment> @badman89 said:

what tool did everyone use for the initial brute, seems to be taking forever using metasploit module even using the hint in this forum about grepping “c”

hydra

Would anyone be willing to PM me a nudge for the .*y and .*o file part? I’m slowly understanding them but it’s taking me quite a bit to push onward… Any/all help is welcome and greatly appreciated :slight_smile:

Does anybody have some time and will to give me a nudge to proceed further ?
I worked on .y and not sure if Fla… solution is right path.
Thank you in advance for anything.

Type your comment> @farbs said:

Would anyone be willing to PM me a nudge for the .*y and .*o file part? I’m slowly understanding them but it’s taking me quite a bit to push onward… Any/all help is welcome and greatly appreciated :slight_smile:

stuck at same stage

Wow!! that message “you must think outside the box” is a understatement.

Hints for user: python - Single vs double quotes in JSON - Stack Overflow

Hints for root: Pray.

This one is great fun but I’m stuck :smiley: A nudge in how to get the manager key would be appreciated. Thought I could download the source / ‘that log’ with the data to generate the key in with another call, but so far no joy. Can see the end result, easy to get the local version to work, but need the final piece of the puzzle.

Guess I could brute a bunch of keys with the function from the source and chuck them at the thing?

trying hurder anyway…

Type your comment> @ashr said:

This one is great fun but I’m stuck :smiley: A nudge in how to get the manager key would be appreciated. Thought I could download the source / ‘that log’ with the data to generate the key in with another call, but so far no joy. Can see the end result, easy to get the local version to work, but need the final piece of the puzzle.

Guess I could brute a bunch of keys with the function from the source and chuck them at the thing?

trying hurder anyway…

Hah! NVM! Forgot about the name of the box.

RE: Well i can segfault it but that’s where my skills die…can’t do the python-dbg gdb thing. If there’s another way hook me up. Got about 14 million keys generated, but surely that’s not the way to do this :disappointed:

Type your comment> @johnnyz187 said:

Wow!! that message “you must think outside the box” is a understatement.

Hints for user: python - Single vs double quotes in JSON - Stack Overflow

Hints for root: Pray.

This a good hint for user, but not for root))
Could somebody give a hint for root?

Disappointed with the root, looks like the author copied the second stage from somewhere without modifying it at all.

Stuck here trying to brute force web links. Is there any special kind of tool or reading required to get moving on this box? I only have the /b***** directory.

Finally rooted. Very fun box!

I can’t find any way to root. I have tried pretty much any standard procedure. Could anyone enlighten me? Thanks!

NVM, rooted! Awesome box.

EXTREMELY disappointed. I rooted it a couple of hours ago since the whole script is online… I then moved on to trying to root it with some unintended method, so I actually felt like i deserved to root the box… the whole thing was enumeration and copy/pasting ■■■■■…

.