LaCasaDePapel

Type your comment> @isitme said:

Thank you to @ScreenSlav3r . Got user and root.

TIPS:

  1. port scan, check every version in services.
    1.1 Do the exploit manually!
  2. Weird shell and only got some city name.
    2.1 You only need 1 or 2 function here. (shell commands & the programming lang function) - Check their website for documentation.
    2.2 If you manage to the command right. You’ll presented with a programming lang function. Using the programming lang function you able to read something.
  3. With the things you read, you can now generate the appropriate cert (no mystery here, the site ask for it, you give it).
    3.1 at this point you should notice a familiar vuln.
    3.2 Question yourself, how to download the file?
    3.3 you should get 1 or 2 files here.
  4. Try and error to get into the machine using the file from 3.3
  5. you should read about FILE PERMISSION.
    5.1 The things is there.
    5.2 Question yourself, how you able to modify the file?

These are great tips. The only thing I would add to this is if your cert has imported into Firefox, but it’s still not working close Firefox and open it again. I beat my head on the wall wondering why it wasn’t working, then I kill -9 firefox-esr reopened it, reloaded the page and viola, the cert portion work.

For what it’s worth, I found this box harder than some that were ranked more difficult.