ok I know that some ppl rooted the box with an unintended way, but I just got root without even exploiting anything!
I was just enumerating, no metasploit or any other attack tools of any kind, just basic enumeration.
Am i missing something?
Confirmed that this is the same “exploit” other people have been using to do it the unintended way.
Basically the ACL on the service control manager has somehow gotten messed up and is allowing all users to create system services. Already got a fix for it and just waiting for it to be applied and rolled out across the servers
@clubby789 said:
Anyone having trouble with the high port:
NC doesn’t work (who knows why). Use telnet
Weird. It works with both putty and telnet perfectly fine
Is the high port needed for initial foothold/user? so far all i’ve done is enumerate some users on the obvious service and get access denied everywhere. hints are welcome
Again apologies for this being such a messy launch.
Don’t beat yourself up about this - it’s not the messiest launch I’ve seen. It’s easy to avoid the “Unintended” methods and if you do, it’s fairly fun.
I’ve messaged him to ask haha cos so far I’m not sure if anyone has actually done it the intended way. There’s a couple of people that are close, going by the messages they’ve sent me, but no one confirmed they’ve got to the end yet.
I’ve messaged him to ask haha cos so far I’m not sure if anyone has actually done it the intended way. There’s a couple of people that are close, going by the messages they’ve sent me, but no one confirmed they’ve got to the end yet.
Sampriti said he did both parts properly