Player

@pirxthepilot said:
Hi all, I’ve been enumerating for almost a week now and still unable to find the “bak”. Wonder if I’m just using the wrong wordlists? Though I’ve tried a lot from seclists/dirbuster already. I know it could possibly be related to vim, and have accounted for it in my enum.

Any nudge in the right direction would be much appreciated!

Well you are in right direction when you said about vim. Think of other editors. There’s no need of wordlists. Identify the php file which responsible for handling access and try different artifact tools against same php file. Good luck ?

This one is something… fun ~_~
Rooted, wasted something about 3 days for it.
Thank you @MrR3boot :wink:

found it finally! thanks for the nudge @bumika , @mRr3b00t and @gverre !

I found the backup file and am stuck as to what to do next. Will appreciate any help via PM.

Forget It!!
Thanks in advance :slight_smile:

I can’t find this backup file. I fuzzed every known file from the enumeration process with every folder I found with a bunch of common extensions. In my desperation I even tried to brute force all possible 3 letter combos on known files.
Could someone give me a hint?

@testmeister said:
I can’t find this backup file. I fuzzed every known file from the enumeration process with every folder I found with a bunch of common extensions. In my desperation I even tried to brute force all possible 3 letter combos on known files.
Could someone give me a hint?

There is an artifact checker on git which definitely help you out. Good Luck :wink:

@MrR3boot got it, thank you!

Finally rooted. The initial enumeration was hard, but after finding the right file the rest was straight forward. I really liked that ff***g exploit, never seen such a beautiful exploit before!

Finally rooted. What a ride!

User was torturous and fun at the same time. Learned a lot on the way. Baby steps with a lot of enumeration and constantly combining information that you found previously. Every step felt like a victory.

That one exploit was some black magic indeed! Unfortunately I had some trouble reading the credits I found, and stupidly overlooked a simple fix. Thanks to @clubby789 for giving me a nudge!

Root was really easy once I got on the right path, but very fun and satisfying. Unfortunately somebody had rewritten an important file, so it took me some extra time to get on the right track.

Great box @MrR3boot - thank you for the adventure!

@kattekebab said:
Finally rooted. What a ride!

User was torturous and fun at the same time. Learned a lot on the way. Baby steps with a lot of enumeration and constantly combining information that you found previously. Every step felt like a victory.

That one exploit was some black magic indeed! Unfortunately I had some trouble reading the credits I found, and stupidly overlooked a simple fix. Thanks to @clubby789 for giving me a nudge!

Root was really easy once I got on the right path, but very fun and satisfying. Unfortunately somebody had rewritten an important file, so it took me some extra time to get on the right track.

Great box @MrR3boot - thank you for the adventure!

Glad you enjoyed my game! Well Done

Rooted.
Pretty awesome box I must say! Learnt a lot. 9/10!

PM is open for anything on the box.

Hello!
I’m stuck on uploading part. Could anyone help me a bit?
Thanks!

This was difficult and fun! The movie deserves an Oscar! Great box @MrR3boot thanks!

Found upload page, tried diff extensions of files, bit confused on how to find the path of the uploaded file, appreciate some push?

ROOTED root@player:~# whoami Hmmm… Really Nice Machine

I must admit, really hard but interesting machine for me, learnt numerous things with this one. SO REALISTIC !!!

Initial Foothold: Dont get fooled by the forbidden gates, take out directories, try getting all the subdomains, etc. Then go ahead and look sources to find something weird.

User: Make a note of what files were mentioned during your initial enum and which of them you were not able to access, or maybe shown some errors.

Root: Standard linux priv esc technique, 007 out running processes, detect the interesting ones and exploit…

Open to DM if anyone needs help :slight_smile:

Hi,
I have been able to comeback to the C****d d** repository and got a “double” hash. No luck with easy dictonary attack. Knowing that brute force is not needed for this machine I’m wondering if I’m chasing a rabbit.
Should I try to crack the hash or I’m lost again?
Thanks,
Victor

Just got user, so far this is my favorite box, really liked the .a** part.

Hello guys! 've been making first steps in pen craft. Could somebody please make some things out clear for me in PM, have several questions, would appreciate it much. Thanks in advance =-)

Finally finished player. Great machine.