Oouch

Big thanks to all, who share their knowledge with other people!
root@oouch:~#

finally rooted i love initial part
PM me for hints if stuck

Am I the only one who cannot get a connection back from the c*****t page?

I’m still not find any foothold
Anyone can help me?

# id
uid=1000(qtc) gid=1000(qtc) euid=0(root) groups=1000(qtc)

Big thanks to qtc for ruining 3 days of my life learning about o****. You more than made up for it on the journey to root which I thoroughly enjoyed.

Also #respekt to the many folks that nudged me along the path to user (you know who you are).

Hints:

For user… if you are like me you will want to rage quit- and that just when you do your initial research. This box is meant to get us outside our comfort zone and force us to learn about stuff that we would never otherwise learn naturally. Because of this, the web is now both safer and more dangerous. :wink:

For root… Basic enum and google search should get it.

God bless you all. ><>

Finally, I did it. Oh man, what a pure pain machine. First of all, thanks to @qtc for his support and the appropriate nudges at each moment and for creating this awesome machine. Also, @rawa gave me some ideas.

On the other hand, this is an insane fucking machine, you need to know about everything to get the flags. For me, the root part was too hard and very dirty. It was a ride on ■■■■-like.

These are my hints.

User:

  • The machine name is a hint about the initial protocol.
  • Examine each request and response in every step of the authorization process. Use tools for that.
  • There is one type of attack that you have to look for.
  • Don’t use the contact page as a way to connect back, this is an insane machine. It can’t be so easy.

Root:

  • Here starts the hard part.
  • Look for the processes that are running on the machine.
  • Discover how the infrastructure has been created and take a look around.
  • When you know where you are, take a look at the config files and the code.
  • Finally, do all the things manually. I didn’t discover anything on the Internet working here.

If you need help, ask for nudges.

Cheers

Spoiler Removed

Spoiler Removed

im in qtc@aeb4525789d8:~$

@xotichacker said:
im in qtc@aeb4525789d8:~$

That might be the problem.

Hardest box, i’ve ever done. Thanks @qtc!

hi all…need some hinit foir priv-sec

@hard said:

hi all…need some hinit foir priv-sec

Get into the right account to use the form of public transport to get the shell you need.

Hi all,
Finally Rooted. Very hard box. If you need some help, u can ask me.

thanks for help @CHUCHO

I’m in aeb4525789d8 and getting error ModuleNotFoundError: No module named 'bytes' when try to exploit. Is there another payload? :frowning:

@tomiashari said:

I’m in aeb4525789d8 and getting error ModuleNotFoundError: No module named 'bytes' when try to exploit. Is there another payload? :frowning:

I dont know, but you can fix this so the exploit works.

I have got the user and i have also find the exploit to the root as well.
But i am stuck in exploiting the payload either its a command format issue as i not getting the www-data in my listener. Any hints??

Type your comment> @tomiashari said:

I’m in aeb4525789d8 and getting error ModuleNotFoundError: No module named 'bytes' when try to exploit. Is there another payload? :frowning:

you need to modify the exploit accordingly, i am not getting any error but still unable to get the www-data shell

@Xaro002 said:

I have got the user and i have also find the exploit to the root as well.
But i am stuck in exploiting the payload either its a command format issue as i not getting the www-data in my listener. Any hints??

Chances are good that you’ve got a slight error in one of the switches.

Hi,I need a bit of help with the last bit of this box,I am www-data and need a bit of help understanding the last exploit,anyone willing to clear up the mist please hit me up…