To seek out new life and new civilizations. To boldly go where no man has gone before!
ok… m*ngos were absolutely new to me… but really funny… (kind of irreal security concept … isnt’it?)
hints from me?..
hints from me:
i made an absolutly ugly script to get an regex password without special chars (ecaped as ‘.’)… and then glued them together with a list of escaped characters… urgh… but it worked…
so my hint:
payloadallthethingsanddontstopthere
root not to mention… ;)… you’ll see it if you’re admin…
my way: if its not alphanumeric or the safe specialchars… use regex ‘.’ … and guess next char… in the end you have an almost perfect password… now search for the missing special char… (of course without regex)…
ok… again i consider this as ugly… but both passwords only had 1 alien inside… so it
worked…
Can someone who’s solved this DM me to discuss enumerating creds. I’ve of enumerated users with scripts modified from different web places but I can’t successfully modify them to get passwords. I get different passwords back depending on the script I run.
Im not sure if it’s my logic or my poor python modifying ability.
Can someone who has solved this please DM to discuss the password regex details, currently have my script responding to the requests, however I am struggling to pass it in the right way.
@brueh said:
To seek out new life and new civilizations. To boldly go where no man has gone before!
ok… m*ngos were absolutely new to me… but really funny… (kind of irreal security concept … isnt’it?)
hints from me?..
hints from me:
i made an absolutly ugly script to get an regex password without special chars (ecaped as ‘.’)… and then glued them together with a list of escaped characters… urgh… but it worked…
so my hint:
payloadallthethingsanddontstopthere
root not to mention… ;)… you’ll see it if you’re admin…
thanks for the machine…
Kind of irreal security concept... isnt'it ? well its not. So many apps sitting in cloud using same technology which mightbe vulnerable to this kinda issue.
@MrR3boot Thank you soo much for this box learned a lot and well you tested my patience so well to get the credentials
Hints:-
User:
Enumerate Enumerate Enumerate
once you found the page understand the technology behind it.
–where would u store the user name and password?
–does that storage has a name ?
MANGO is a super hint
write some code,exploit it and well you need to have little bit of python knowledge
patience patience patience
you got user and for
Root:
basic enumeration and little bit of GTFOBins and you have root
@AnonSimba said: @MrR3boot Thank you soo much for this box learned a lot and well you tested my patience so well to get the credentials
Hints:-
User:
Enumerate Enumerate Enumerate
once you found the page understand the technology behind it.
–where would u store the user name and password?
–does that storage has a name ?
MANGO is a super hint
write some code,exploit it and well you need to have little bit of python knowledge
patience patience patience
you got user and for
Root:
basic enumeration and little bit of GTFOBins and you have root
So I just want to thank @MrR3boot for creating a box that was definitely a nice challenge for my first non-retired box. First time juicing the mangoes, and it was well worth the squeeze.
Another thank you to @D3Fix, you have no idea how much your guidance helped along the way.
This is what I have learned:
User-
Listen to the responses you get back, they will be the seed that allows you to grow that mango tree and squeeze it for all it’s worth.
Regex can be your friend and your foe.
Take breaks, i think I went a little more grey from this box.
Root-
When going from one user to another, remember your ■■■■■■■■ basic enum…2 hours… grrr
Making it to root can seriously GTFO, for me nothing to user took all up probably 9 hours and from user to root took 10 minutes if that.
But again, thanks for the fun challenge and introduction to active machines @MrR3boot. I will surely remember this one, and now mangoes aren’t that scary.
@Spknoxy said:
So I just want to thank @MrR3boot for creating a box that was definitely a nice challenge for my first non-retired box. First time juicing the mangoes, and it was well worth the squeeze.
Another thank you to @D3Fix, you have no idea how much your guidance helped along the way.
This is what I have learned:
User-
Listen to the responses you get back, they will be the seed that allows you to grow that mango tree and squeeze it for all it’s worth.
Regex can be your friend and your foe.
Take breaks, i think I went a little more grey from this box.
Root-
When going from one user to another, remember your ■■■■■■■■ basic enum…2 hours… grrr
Making it to root can seriously GTFO, for me nothing to user took all up probably 9 hours and from user to root took 10 minutes if that.
But again, thanks for the fun challenge and introduction to active machines @MrR3boot. I will surely remember this one, and now mangoes aren’t that scary.
i could really use a nudge on initial foothold tried looking at the certificate and found a domain name which returns an error, tried brute forcing the pages for different links but no luck either.
Can someone please point me in the right direction
Edit:Found the login page,was able to to get credentials but not sure where i can use those tried 22 and login but no luck can anyone help me
It was pleasure to cope with this machine. I haven’t known this type of fruit earlier, perhaps the climate is not sufficient for growing it in my area. I enjoyed that I needed to develop a script to get user access, and develop a simple program to provide root access.
Stuck on login page. Using repeater, but always respond the same… also found /h…p which redirects. Any idea where to move? Bruteforce login password? found script to inject into nosql dbs… but it doesnt work… i am stuck
@protei300 said:
Stuck on login page. Using repeater, but always respond the same… also found /h…p which redirects. Any idea where to move? Bruteforce login password? found script to inject into nosql dbs… but it doesnt work… i am stuck
I was stuck there for a long time as well. Make sure that the script uses the same method as when you try to login via the browser…