Mango

Got root. Nice box - thanks to the creator.

I got the password using cURL, BASH and intruder. I was not able to make the mentioned py script work for me. If someone will share their py script I would appreciate it very much.

I found the initial foothold difficult but learned new things on the way. PM me if you need help. Even thou I think reading this trend trough a couple of times should provide all help that is needed.

this is beating me up bad!

Can someone please PM me a nudge for foothold

@elpastor said:

Breaking down and asking for a nudge, kick or push for Mango. Trying to get user credentials and stuck. Thanks

Assuming you’ve got something to attack, it is a bit painful. The best suggestion I can make is to search for the database technology you are looking at and the words password extraction. You should find a blog post which helps build the attack script you need.

Rooted. Super cool box, I learned so much at every step, props to the creator.

For anyone having problems using some p****n scripts they found to crack the login page:

  1. Those are proof-of-concept scripts. They are built for one specific server, which uses a different type of login page. Look at the browser or burp to see what the login request has to look like and change accordingly.
  2. The scripts are not build for realistic environments; this box is realistic enough to force you to improve the found script quite a bit.

Don’t just execute the scripts, understand them and build a better one.

PS: Pls remove if considered too spoilery

Rooted ! Anyone available to enlighten me on how did you harvest the username ? I sort of guessed the username…

Type your comment> @IamKsNoob said:

Rooted ! Anyone available to enlighten me on how did you harvest the username ? I sort of guessed the username…

You can harvest usernames in the same way as you harvest passwords. Just use a wildcard for the password.

rooted ! really similar of the SamboxV3 chall on root-me. Nice box tho

I was able to harvest 2 usernames and 2 passwords with the modified python script, but neither seems to work…is it possible that the passwords contain special characters?

EDIT: rooted. Answered my own question :smile:

Great box and I learned a ton. PM for nudges and include what you have done so far.

Stuck at finding the login page. Tried a lot of suggestions but lost where to continue looking.
Would love a nudge! :smiley:

@aladante said:

Stuck at finding the login page. Tried a lot of suggestions but lost where to continue looking.
Would love a nudge! :smiley:

Investigate the certificate.

The a*******s page is showing a codepen error :
Current key is only applicable for *.codepen.io.
Read more info about this error
You are trying to use the following key: XXX-XXX-…
Is it important or it hinders the challenge ?

Rooted, nice the user part, python helped me a lot to harvest users name and passwords.
About the root, I got the flag without the root shell, if somebody got the shell can PM me?
I don’t understand why my command didn’t work.
thanks.

Really struggled with this one. Foothold was not easy.

Rooted. PM me if you need help.

Thanks @MrR3boot , awesome box.

found login page finally! this is so different to what ive been used to that i am very stuck, is there any kind person on here that would be willing to take me under your wing and help me out?

@kindominic said:

Literally have no clue in what to do.

Im in the login page, and im guessing that i need to inject, but nothing seems to work. Any advice?

@Gizmet said:

found login page finally! this is so different to what ive been used to that i am very stuck, is there any kind person on here that would be willing to take me under your wing and help me out?

This step can be a bit painful. I never ended up with a fast script (or a pretty one), but if you google the DB name and password extraction, you might find an article which helps.

ok, got an under construction page… where next lol

@Gizmet said:

ok, got an under construction page… where next lol

I dont recall that, but if you haven’t already done so, check the certificate.