Rooted :).
Not a very interesting box tbh. PM me if needed !
Rooted :).
Not a very interesting box tbh. PM me if needed !
Rooted. The initial step wasn’t difficult but a bit confusing if you’re not too familiar with R*d**. The privilege escalation part was a bit too easy for my liking. I’m sure it might hold some value for beginners. If you need help PM me.
Not the best box here, but whatever. I guess the first step could be messy on public…
I got root before user, not really sure if I missed something obvious.
Got root, there’s plenty of hints on here already
Struggled with the last stage for some reason, had everything right but an unknown issue was stopping a connection.
Pm me if you need help
This one was interesting, you can definitely go down a rabbit hole super easily if you assume all public tools will hold the key. This one was one-offed quite a bit and is only easy if you’re super creative.
rooted
PM for nuggets
Stuck in M*** user, any nudge for the root? Exploit in msf is not working
I’m not familiar with r**** so I think I’m down the rabbit hole. The obvious exploits don’t work (assuming on purpose), will I need to ‘guess the username’ somehow, or can I find that via enumeration?
Type your comment> @idomino said:
I’m not familiar with r**** so I think I’m down the rabbit hole. The obvious exploits don’t work (assuming on purpose), will I need to ‘guess the username’ somehow, or can I find that via enumeration?
No guessing is needed for this box
@blackwingz44 said:
Stuck in M*** user, any nudge for the root? Exploit in msf is not working
Just exploit something that before getting a user you couldn’t. It Is a common vulnerability.
GitHub > msf
slave is not the way
if it is slaved and you cant write, try
slaveof no one
Rooted, if you think or have a question why not work.
Try to reset machine first.
@_@
I’m stuck with r***-**i part. Is it necessary to guest the username? It is not possible to follow the steps the way is shown in a recommended book…
Rooted! Thanks to all for the help! I enjoyed learning about the services on this box. Thanks for providing it, @TheCyberGeek!
I got access with r… user and found the i._…k file.
I have used ssh2john to move it to hash and john to find the passphrase…I got a match with c…8 but connection get closed…for sure I do something wrong, but what?
Type your comment> @garbo77 said:
I got access with r… user and found the i._…k file.
I have used ssh2john to move it to hash and john to find the passphrase…I got a match with c…8 but connection get closed…for sure I do something wrong, but what?
In which directory user.txt is saved? Think and check users.
I try to connect it with my rce py it get connection time out I use 10.10.10.160
Type your comment> @Pratik said:
Type your comment> @garbo77 said:
I got access with r… user and found the i._…k file.
I have used ssh2john to move it to hash and john to find the passphrase…I got a match with c…8 but connection get closed…for sure I do something wrong, but what?In which directory user.txt is saved? Think and check users.
rooted…enumerate enumerate enumerate