stuck with the upload form, tried different approaches (using just magic, concatenating two files) but can’t get RCE, let alone a reverse shell! a nudge would be appreciated
You can get a good example of how to bypass this by googling what you are trying to do and going to a gitbook page.
Ideally you want to be uploading an actual valid image.
Could not attach to process. If your uid matches the uid of the target
process, check the setting of /proc/sys/kernel/yama/ptrace_scope, or try
again as the root user. For more details, see /etc/sysctl.d/10-ptrace.conf
ptrace: Operation not permitted.
in my local solytion alredy found, but, as always, not in the server)
Could not attach to process. If your uid matches the uid of the target
process, check the setting of /proc/sys/kernel/yama/ptrace_scope, or try
again as the root user. For more details, see /etc/sysctl.d/10-ptrace.conf
ptrace: Operation not permitted.
in my local solytion alredy found, but, as always, not in the server)
You might be overthinking this. You don’t need to RE anything for this box. Have a look at what its doing and see if you can meddle with it.
#Maybe an issue?
Hi, i’m stuck with the upload of image… i tried all way to upload my rev, but if i upload a clean image too, catch ever and ever the “alert” of png, jpg extension.
Hi All. Working on root. When trying to upgrade the shell, it seems I am now getting an error that won’t allow /bin/sh commands. Anyone having that problem or know how I might be able to get around? This was not an issue for the last few days.
Could I have an hint on the initial foothold ?
I can upload a file that contains PHP code, but I haven’t found a way to make it end with a executable extension. (Null bytes, double extension, content-type didn’t work).
I haven’t found any PHP file that does inclusion and would allow an RCE by including the image with php code.
I have also tried to include php instructions directly into the page since quotes aren’t filtered in the filename but it didn’t work either.
I am a bit lost about the direction I should take.
Obviously, I find what I am looking just after asking for help ?.
Search for OWASP documentation about file upload. There are some strange configuration about what get to be executed on a server.
Incredibly satisfying box for me. Although the frustration at getting initial foothold was maddening, the moment you realize how to get it, will give satisfaction in awesome waves ;). Root was very routine I think. The user part was really great. Thank you for this box.
FOOTHOLD: Burp, exiftool and curl will help you. After, a strong reverse shell is necessary.
USER: An interesting service is running, not reachable before… And think easy way!
ROOT: suid3num, strings or pspy64, and find the right “path”!