@W4rF4ther take a look again at the 2nd thing you mentioned. There should be something interesting there. A thing you would throw on a fire. Once you find the thing, Google is your friend. Once you have your files in place, it may take a couple of tries.
I was never able to get a stable shell, but worked long enough to get the flag.
Youhou we have done a three combo spoiler removed!
Unfortunately got no time to see your answer to my question @TazWake and @OffsecGeek01 . Can you MP me your answer to my issue with mail and… you know such type of sqlthings… thank you!
Wow, what a nice yet challenging box! user was way harder than root if you didn’t know the attack vectors. Thanks to @marlasthemage for the nudges to point me to the right direction! And thanks to @MrR3boot for another “nasty” experience. After all the struggle with user I at least added 2 additional vectors to the arsenal. Read and learn is so true xD
As always I’m happy to help!
Hello,
I know the privesc needs to play with lro*.
But is it to exploit an apache vul like cfca**** or not at all?
THanks for your answer
You are on the right way with your first statement. As mentioned there is a well documented tutorial to exploit this vulnerability which you can use with almost no changes. Try to understand why you have this files in your user directory and what happens when the vuln program runs.
Yeah, I know I have to overwrite it. The thing is I don’t know what uncommon technique to use and it is hard to google it. I’m trying everything in Burp. I can PM you with the things I tried and managed to do.
Yeah, I know I have to overwrite it. The thing is I don’t know what uncommon technique to use and it is hard to google it. I’m trying everything in Burp. I can PM you with the things I tried and managed to do.
Yeah, I know I have to overwrite it. The thing is I don’t know what uncommon technique to use and it is hard to google it. I’m trying everything in Burp. I can PM you with the things I tried and managed to do.
ok
No prob, I just got it, @Cedgar helped me. It was really easy, I was just missing a thing. I won’t forget this lesson though. Thank you very much to both of you!
Great box, Kudos on this. Really liked the different methods here and it was a good learning experience!
Definitely enough hints in this thread, best I can say:
User: see all the other comments, nothing better to say here
Root: Once you learn how things switch in and out, RTFM, and compare what you found online with what you have available. Once you tweak it correctly, if you aren’t getting the expected output, be sure try a few times and different ways, sometimes things you think won’t work, but they eventually will
I’ve managed to get something important that should let me in on a small port. It doesn’t seem to be working though and I’m completely stuck. I have tried my best not to ask for help and I’m proud how far I’ve gotten but if someone could PM me I’d really appreciate a nudge.
I’ve managed to get something important that should let me in on a small port. It doesn’t seem to be working though and I’m completely stuck. I have tried my best not to ask for help and I’m proud how far I’ve gotten but if someone could PM me I’d really appreciate a nudge.
Chances are good that your content is missing some characters at the end of each line.