Type your comment> @FlompyDoo said:
any hints for running s******y as p****r using the command so. I just get permission denied.
Any hint? I’m stuck at the same point
Type your comment> @FlompyDoo said:
any hints for running s******y as p****r using the command so. I just get permission denied.
Any hint? I’m stuck at the same point
Hi Guys, Im stuck in jump from w**-*** to pr, I found the snake script in /v**//Ad**-U****/ and know how exploit this, but can’t look the way for jump to that User, I would be appreciate any hints.
got root…pm for hint…
@TigaxMT Thanks for the hint for getting the initial foothold, as soon as I got that it was no problem
i dont know man but my escaping sucks. i can make the ping continue (including the injected string) but my injected string says permission denied on user flag. hope someone would dm me to correct it
I dont Know how to exploit the rooms. Can anyone give me a nudge?
Finally got root, thank @EternalB1ue for your help in the last step, If anyone needs any help feel free to ping me
just got user. learned a lot. moving on to root. thank you everyone
Rooted! I like this box. I thought this box was refreshing and my takeaway was to not forget about some basic checks when enumerating. I got too focused on one type of attack for the initial foothold. Getting user made me think a little outside the box to get what I needed. Root was not that bad and pretty straightforward.
I’m lost in pivoting to user p_____r. I understand that something must be done with the file s_______y especially with -p option. Any hint for abusing the option (I new remote shell with w_____a priv ?
Type your comment> @h0plite said:
I’m lost in pivoting to user p_____r. I understand that something must be done with the file s_______y especially with -p option. Any hint for abusing the option (I new remote shell with w_____a priv ?
There are lots of hints for how to do this in this forum thread already.
Rooted !
Really nice box ! PM me if you’re stuck
This was a fun easy box.
Very curious about the separation of user here and there.
I can’t see the file that I write by the user pep*** here if I logged in into s** …
If someone knows the reason I would love to hear it …
@manulqwerty @Ghostpp7
Wonder if anyone else found the user flag from the early enumeration stage lol
Finally rooted it!! Huge thanks to @rub1ks for the explaination and nudge. If anyone needs any help please DM me.
Edited: Nvm
Type your comment
Type your comment> @ivnnn1 said:
I’m stuck at s*****r.py, trying to execute commands but I’m not finding any solution. Can someone PM me?
@CrystalSage said:
Stuck as w**-***a. Need to escalate to user. Can anyone help ?
Just think " how you can bypass filtered command" on google This is all you need.
anyone around for a quick question for root?
Just got a root after few days stuck on s********y due wrong syntax lol.
Many thanks to @env for the user stage hints