Jarvis

Type your comment> @FlompyDoo said:

any hints for running s******y as p****r using the command so. I just get permission denied.

Any hint? I’m stuck at the same point

Hi Guys, Im stuck in jump from w**-*** to pr, I found the snake script in /v**//Ad**-U****/ and know how exploit this, but can’t look the way for jump to that User, I would be appreciate any hints.

got root…pm for hint…

@TigaxMT Thanks for the hint for getting the initial foothold, as soon as I got that it was no problem :slight_smile:

i dont know man but my escaping sucks. i can make the ping continue (including the injected string) but my injected string says permission denied on user flag. hope someone would dm me to correct it :smiley:

I dont Know how to exploit the rooms. Can anyone give me a nudge?

Finally got root, thank @EternalB1ue for your help in the last step, If anyone needs any help feel free to ping me :slight_smile:

just got user. learned a lot. moving on to root. thank you everyone

Rooted! I like this box. I thought this box was refreshing and my takeaway was to not forget about some basic checks when enumerating. I got too focused on one type of attack for the initial foothold. Getting user made me think a little outside the box to get what I needed. Root was not that bad and pretty straightforward.

I’m lost in pivoting to user p_____r. I understand that something must be done with the file s_______y especially with -p option. Any hint for abusing the option (I new remote shell with w_____a priv ?

Type your comment> @h0plite said:

I’m lost in pivoting to user p_____r. I understand that something must be done with the file s_______y especially with -p option. Any hint for abusing the option (I new remote shell with w_____a priv ?

There are lots of hints for how to do this in this forum thread already.

Rooted !

Really nice box ! PM me if you’re stuck :slight_smile:

This was a fun easy box.

Very curious about the separation of user here and there.

I can’t see the file that I write by the user pep*** here if I logged in into s** …

If someone knows the reason I would love to hear it …

@manulqwerty @Ghostpp7

Wonder if anyone else found the user flag from the early enumeration stage lol

Finally rooted it!! Huge thanks to @rub1ks for the explaination and nudge. If anyone needs any help please DM me.

Edited: Nvm

Type your comment

Type your comment> @ivnnn1 said:

I’m stuck at s*****r.py, trying to execute commands but I’m not finding any solution. Can someone PM me?

@CrystalSage said:
Stuck as w**-***a. Need to escalate to user. Can anyone help ?

Just think " how you can bypass filtered command" on google :slight_smile: This is all you need.

anyone around for a quick question for root?

Just got a root after few days stuck on s********y due wrong syntax lol.

Many thanks to @env for the user stage hints