Don’t overcomplicate it like I did! Remember that it is rated as an easy box. I’ve wasted a couple of hours trying to fix that “module” thing. Think about what else you can do.
Root:
That’s an easy one, you will get it if you’ve done your nmap well.
None of these exploits works I tried 100 times and NONE of them are working. I get permission denied for the xxx exploit script, and xxxxx command not found , and the script overflow doesn’t work. Nothing is working. I also tried to do it manually and nothing worked.
Hey,
Found the username M*** and the i****.k file used john and got c*8. Trying to connect over with ssh likewise the previous ssh connection. but using M and its r. It results in Authentication failed. Is it normal?
I figured out why I get the Authentication failed.
Not sure if this should go here, but is there any specific reason why I can’t submit the root flag? I got it, but I keep getting an error whenever I try to submit it. Same with the user flag.
Not sure if this should go here, but is there any specific reason why I can’t submit the root flag? I got it, but I keep getting an error whenever I try to submit it. Same with the user flag.
You’re not putting anything special in are you?..like flag{}?..just pasting the hash?
Not sure if this should go here, but is there any specific reason why I can’t submit the root flag? I got it, but I keep getting an error whenever I try to submit it. Same with the user flag.
You’re not putting anything special in are you?..like flag{}?..just pasting the hash?
I wasn’t, I was just being an idiot, didn’t know I had to choose how difficult I found it.
Rooted - although overall not that difficult, was a good learning experience. Admittedly took me awhile to figure out that my location for r****-c** was wrong, thank you @n1njaaa