@pirxthepilot said:
Hi all, I’ve been enumerating for almost a week now and still unable to find the “bak”. Wonder if I’m just using the wrong wordlists? Though I’ve tried a lot from seclists/dirbuster already. I know it could possibly be related to vim, and have accounted for it in my enum.
Any nudge in the right direction would be much appreciated!
Well you are in right direction when you said about vim. Think of other editors. There’s no need of wordlists. Identify the php file which responsible for handling access and try different artifact tools against same php file. Good luck ?
I can’t find this backup file. I fuzzed every known file from the enumeration process with every folder I found with a bunch of common extensions. In my desperation I even tried to brute force all possible 3 letter combos on known files.
Could someone give me a hint?
@testmeister said:
I can’t find this backup file. I fuzzed every known file from the enumeration process with every folder I found with a bunch of common extensions. In my desperation I even tried to brute force all possible 3 letter combos on known files.
Could someone give me a hint?
There is an artifact checker on git which definitely help you out. Good Luck
Finally rooted. The initial enumeration was hard, but after finding the right file the rest was straight forward. I really liked that ff***g exploit, never seen such a beautiful exploit before!
User was torturous and fun at the same time. Learned a lot on the way. Baby steps with a lot of enumeration and constantly combining information that you found previously. Every step felt like a victory.
That one exploit was some black magic indeed! Unfortunately I had some trouble reading the credits I found, and stupidly overlooked a simple fix. Thanks to @clubby789 for giving me a nudge!
Root was really easy once I got on the right path, but very fun and satisfying. Unfortunately somebody had rewritten an important file, so it took me some extra time to get on the right track.
Great box @MrR3boot - thank you for the adventure!
User was torturous and fun at the same time. Learned a lot on the way. Baby steps with a lot of enumeration and constantly combining information that you found previously. Every step felt like a victory.
That one exploit was some black magic indeed! Unfortunately I had some trouble reading the credits I found, and stupidly overlooked a simple fix. Thanks to @clubby789 for giving me a nudge!
Root was really easy once I got on the right path, but very fun and satisfying. Unfortunately somebody had rewritten an important file, so it took me some extra time to get on the right track.
Great box @MrR3boot - thank you for the adventure!
I must admit, really hard but interesting machine for me, learnt numerous things with this one. SO REALISTIC !!!
Initial Foothold: Dont get fooled by the forbidden gates, take out directories, try getting all the subdomains, etc. Then go ahead and look sources to find something weird.
User: Make a note of what files were mentioned during your initial enum and which of them you were not able to access, or maybe shown some errors.
Root: Standard linux priv esc technique, 007 out running processes, detect the interesting ones and exploit…
Hi,
I have been able to comeback to the C****d d** repository and got a “double” hash. No luck with easy dictonary attack. Knowing that brute force is not needed for this machine I’m wondering if I’m chasing a rabbit.
Should I try to crack the hash or I’m lost again?
Thanks,
Victor
Hello guys! 've been making first steps in pen craft. Could somebody please make some things out clear for me in PM, have several questions, would appreciate it much. Thanks in advance =-)