User: as described in previous posts, no need to mess with POC but need to tinker with payload.
Root: I went the VT way first and got and decrypted its password as per known exploit, but after that I was lost, so I went via old good and tested tools.
If you want to send me some nudges on how to finish the VT way, it would be good.
Finally got root.txt, took me way toooooooo long.
Thanks to a hint from Rohitbarthwal I finally got it.
Many thanks to everyone on the forum and the creator(s) of the box!
Well…I rooted the box last night. I used the U****c method but it was kind of anti-climatic…It wasn’t the root shell method. Instead of using netmeow, I pretty much abused the service to place the root flag somewhere I can read. After I popped it into own root…it worked. It was a long battle but I learned a lot about Windows pen-testing.
Can someone dm me or inform me if there is some trick to get the u*****o exploit to work? Using one from github and if I try to issue a diff command then what is on the readme, I get an error. Trying to get user btw. I have proper creds