what’s so cool about s***y. if you run commands you’re still wa so why is that useful.
On *nix systems, there are a couple different ways where when you run a program it actually executes as another user. Programs with those permissions by their very nature are often among the most interest targets when attempting to privesc.
Good box. Lot’s of steps for an “easy” box but very straightforward.
Foothold: aim well when taking a dump
User: There’s probably a few ways to do this. But my hint is remember to play with POSIX only. The command doesn’t use bash
Root: enumerate for a weird misconfiguration
I’m completely stucked on privesc, i think i’ve found the point with s*******l but not sure about how can i use it… if someone could help me with a link to some resources that could help me to privesc…
I’m completely stucked on privesc, i think i’ve found the point with s*******l but not sure about how can i use it… if someone could help me with a link to some resources that could help me to privesc…
I submitted a reset for the box but obviously it won’t reset now that I’ve figured out how to get to user LOL - seriously if changing those codes was just to troll those who haven’t got user yet, not cool man >:(
Rooted! Jarvis was a pretty fun and straight forward box (now that I’m looking back) like most people said!
User:
There’s some kinky stuff in this special room.
So you’re now trying to get user and you’re stuck, take a step back and look at the big picture for your classic enumeration skills. (This goes for both parts, the simplest of commands should get you there).
Root:
Use your classic enumeration scripts.
If a user can have control over root, bad things can happen.
You can find an article that will be helpful. Take the instructions on there loosely, understand every aspect stated on there.
I could use a nudge on root if anyone is available. I’m fairly green on privesc techniques, I have some ideas, but I’m not sure if I’m anywhere near the right path or how to execute on those ideas.