Book

@khanafeer said:

I am stuck on this part, the payload work on my machine as good but couldn’t view it in PDF

This, largely, depends on how you view the PDF. There are many ways round it other than using the default viewer built into Kali. While this frustrated me for a long time, like most other people, I don’t think that box creators should make it “extra easy” to get data via information leakage.

Type your comment> @TazWake said:

@khanafeer said:

(Quote)
This, largely, depends on how you view the PDF. There are many ways round it other than using the default viewer built into Kali. While this frustrated me for a long time, like most other people, I don’t think that box creators should make it “extra easy” to get data via information leakage.

Same situation here. I am not using the default kali PDF viewer, but I still see no information there. It seemed to respond to “height” and “width” though.

@zelensky said:

Same situation here. I am not using the default kali PDF viewer, but I still see no information there. It seemed to respond to “height” and “width” though.

Then something you are doing isn’t working. Start small, with data you know has to exist on the system. If you can’t get it to show you that, the attack needs to be changed.

Any root hint stuck here:(

Type your comment> @0xstain said:

Any root hint stuck here:(
Look at running services, look at files (in your directory) that are a bit out of place, connect the dots.

I totally have no clue how let the site expose additional data, maybe someone is willing to TEACH me? Or tell me what to read first?
Please PM!

Type your comment> @karl99 said:

I totally have no clue how let the site expose additional data, maybe someone is willing to TEACH me? Or tell me what to read first?
Please PM!
Have you got admin? if so, there is a functionality within the webapp that allows some sort of “interaction” between the user and admin. When the Admin performs his action, certain things are loaded dynamically then and there.

Hey everyone, this box has been a good learning experience. I could use a little help with getting root. I’m pretty confident I have figured out what needs exploited, but I can’t figure out how to trigger it. I’ve been at this for a few nights now, but I’m pretty much just stuck at this point. If anyone is willing to nudge me a bit, please post here or PM me. Much appreciated!

@dskeet said:

Hey everyone, this box has been a good learning experience. I could use a little help with getting root. I’m pretty confident I have figured out what needs exploited, but I can’t figure out how to trigger it. I’ve been at this for a few nights now, but I’m pretty much just stuck at this point. If anyone is willing to nudge me a bit, please post here or PM me. Much appreciated!

Set up the delivery file, run the exploit, modify the target file.

Type your comment> @TazWake said:

@dskeet said:

Hey everyone, this box has been a good learning experience. I could use a little help with getting root. I’m pretty confident I have figured out what needs exploited, but I can’t figure out how to trigger it. I’ve been at this for a few nights now, but I’m pretty much just stuck at this point. If anyone is willing to nudge me a bit, please post here or PM me. Much appreciated!

Set up the delivery file, run the exploit, modify the target file.

Thanks. I’m an idiot. Much simpler thank I was making it.

Managed to get private key for user r***** but…

Load key “id_rsa”: invalid format
r*****@b***.***'s password:

This is sooo frustrating. What am I doing wrong?

Type your comment> @awarkozak said:

Managed to get private key for user r***** but…

Load key “id_rsa”: invalid format
r*****@b***.***'s password:

This is sooo frustrating. What am I doing wrong?

The text of the key is too big to fit on the file you are rendering it too. So when you copy and paste you aren’t getting all of the characters. Change things up to make the keys text fit where you are rendering it.

Root Dude, learn much new thing from this box
thank you for @EnigmaNL and @TazWake for the hint :slight_smile:

Rooted. Many new things for me.
Thx to all the people who helped me.
If you’re stuck - PM me and i help you.

Very cool box !

I lost hours in trying to exploit the wrong field for getting user…

User hint: if you don’t have enough “place”, maybe there is a better place :wink:

Root hint: Monitor what is happening, do some research, find a spell recipe and profit !

Finally rooted.
It was a journey. A big thank you to @TazWake (I think you should start making machines) and @nasri136TH who helped with user.
The thing with this box is, if you don’t know the specific name / vector of the attack you will have a very hard time. There are two articles that describe almost perfectly what you need to do in the first and second parts of user. The thing is, it is very difficult to find them without a good understanding of what the machine is actually doing.
PM me for these links if you want.

Root is difficult on public servers, but you can use a good payload to overcome it (the published one is not very good IMO). Shoot me a PM if you want to discuss payloads.

@MrR3boot, Thanks a lot! It was a great machine. To all machine builders, maybe consider disabeling system-wide messaging (write/wall).

@JayThree said:

The thing is, it is very difficult to find them without a good understanding of what the machine is actually doing.

This is a very valid point. I think this bit makes it on the harder end of medium.

@TazWake @snownoob I thank you both for leading me to rooting this box. Definitely learned a lot, and I would’ve been stuck in the blind if it wasn’t for you guys.

Struggling with root… I’ve been staring at processes for 2 days now, googling everything I can see running, and I’m just not seeing anything useful :confused:

@ShadowSuave said:
Struggling with root… I’ve been staring at processes for 2 days now, googling everything I can see running, and I’m just not seeing anything useful :confused:

Same here. Let me know if you have any luck.