Resolute

20 minutes to go, looks interesting. Anyone else see this as Linux when it was in “Unreleased”?

Lest go xd

Can’t find anything! :frowning:

Unable to connect

I found a lot of users.

Well, that was an easy user pwn :smiley:

*Spoiler Removed

Think someone have tried to be funny and change the password…

Easiest user I’ve ever done.

@extincted said:
Think someone have tried to be funny and change the password…

Think more about what you’ve seen, and what it indicates about the system.

edit: solved. removing initial post.

user.txt
so easy

Is ke**********g the way to go?

Type your comment> @Ma1ware said:

Is ke**********g the way to go?

No need for that, at least for user

HI guys, can you please give me a hint on where to go to get user on resolute, I tried searching for exploits on the services that nmap found, but nothing worked.
Thanks

I may have spotted the root vulnerability, could be a rabbit hole

I have a bunch of usernames but most options require passwords. The only option from I****ct without password returns nothing. Also is 445 a rabbithole for user?

Type your comment> @tang0 said:

I have a bunch of usernames but most options require passwords. The only option from I****ct without password returns nothing. Also is 445 a rabbithole for user?

No. try harder

Type your comment> @tang0 said:

I have a bunch of usernames but most options require passwords. The only option from I****ct without password returns nothing. Also is 445 a rabbithole for user?

Check the output from your enumeration process line by line. Since you have the usernames, I guess you probably didn’t see it, due to some error messages.

Got into user 2, the hint makes it sound difficult.
Edit: On the edge of root now, interesting vuln.

Built my root payload, now to get it executed right