@Lukee505 said:
Could someone help me out in PM if you have a minute?
I’ve edited the monitor.sh and tried catting the contents of root.txt to a temp file but got permission denied on cat.
Also tried nc to pass a root shell but that didnt seem to do anything
Enumerate the machine more - LinEnum.sh tells you what you need to know
Do people keep changing the user creds? I was able to login about 30 minutes ago. Then whilst I was working on something the box got reset. I go to log on to try and get a shell and the creds don’t work anymore.
@g1ant372 said:
@MrChrisWeinert @dvnv @jc1396
Any luck with the TTY issue when trying sudo?
I feel this is the last thing to get root. But may be a common fix as i saw the same issue in Bashed, but didn't end up needing it.
PM me if needed.
i am having this same issue. need help
easily got the user.txt. Just ran the LinEnum and found the monitor.sh, i got stuck here and have no idea how to get the root
@g1ant372 said:
@MrChrisWeinert @dvnv @jc1396
Any luck with the TTY issue when trying sudo?
I feel this is the last thing to get root. But may be a common fix as i saw the same issue in Bashed, but didn't end up needing it.
PM me if needed.
i am having this same issue. need help
easily got the user.txt. Just ran the LinEnum and found the monitor.sh, i got stuck here and have no idea how to get the root
Have you tried interacting with monitor.sh?
yeah but same tty error popping up even after setting up interactive terminal
So getting the username and password was easy and finding the admin panel was pretty simple too. Now the only issue is the exploit. I found the exploit but I keep getting the “manual cleanup of ‘image.php’ on the target” error. I reset the machine, but I’m still getting the same error. I tried a different payload and a connection was established, but i was unable to run any commands. Anybody running into this same issue?
@witchkingsteve said:
So getting the username and password was easy and finding the admin panel was pretty simple too. Now the only issue is the exploit. I found the exploit but I keep getting the “manual cleanup of ‘image.php’ on the target” error. I reset the machine, but I’m still getting the same error. I tried a different payload and a connection was established, but i was unable to run any commands. Anybody running into this same issue?
I was able to get shell to work after a few tries. Host is a bit buggy. The same shell which had failed 3-4 times before worked. Got the user hash. Working on r00t
so i tried to get LinEnum on the host via wget, curl, and scp from my host but none of them work. Can someone point me in the right direction as to how to get the shell script on the host
@witchkingsteve said:
so i tried to get LinEnum on the host via wget, curl, and scp from my host but none of them work. Can someone point me in the right direction as to how to get the shell script on the host
I figured it out, the upload command in meterpreter kept spitting out errors, but i figured it out after a couple of tries.
I’ve got the user flag and I can’t for the life of me figure out how to get root. I’ve run linenum.sh and I know about what’s weird but I don’t know how to use that information because of the ‘tty not detected’ error when I try to sudo. Can I PM someone for some advice?
so i tried to get LinEnum on the host via wget, curl, and scp from my host but none of them work. Can someone point me in the right direction as to how to get the shell script on the host> @Demosz said:
I’ve got the user flag and I can’t for the life of me figure out how to get root. I’ve run linenum.sh and I know about what’s weird but I don’t know how to use that information because of the ‘tty not detected’ error when I try to sudo. Can I PM someone for some advice?
How did you get the LinEnum.sh to run? I’m having issues PM me?