Well. wasted 2 hours because someone decided to disable the p****** p*****. After a reset it magically worked … And, as I did not use the forum for nudges, I explored further and downloaded all files to examine … lol.
Yeah, did you reset the box recently? Because I was in with some users found, but after a few minutes the credentials were not working anymore… I’m not sure if someone modified them, so I found a false positive…
Are the credentials used for the first login also to be used for the second? Because it sometimes logs in but sometimes it says the credentials are invalid.
god dammit, just found the H**
this is the first box that i’ve seen that does that, it shouldn’t be allowed ???
EDIT: so i have no idea how you’re supposed to get user, but rooted :^)
Totally agree with you on this one … but once you bite the clue its a matter of time till you discover it … maybe it will be more in line if it was bit like previous machines with v****.
And rooted Almost got root before getting user, but then found the way in
Really a nice box, though I didn’t like that fact that others can easily break the whole machine (or sometimes just partially, which makes gaining foothold even more frustrating), which then requires a reset of the machine. For those who haven’t solved it yet: There are less intrusive ways of gaining access to the machine. There is no need to change anything
rooted. That was a fun box. My hint would be that there are definitely ways around a certain thing being turned off. Youll have to read to figure out why.
From there, it is very straight forward with normal enumeration. Nothing too crazy. Very much enjoyable.
Can someone PM me and give me a hand on the guessing part please? I literally bruteforced every H** possible directories and still stuck, and google searches didn’t provide me any additional hint. I’m not good at this guessing stuff, I just want to exploit things.
Is anyone having trouble with the first exploit after the foothold. It takes FOREVER to run and all of the data is blank. I had to modify the exploit to target exactly the data I want before it would return anything