rooted. the last step importing the strange file format kept failing yesterday with the same error message as OxO, but the same commands worked today without any changes, apart from the box being reset in between. also worth saying that i didn’t need the cat, and didn’t have change any passwords - if you think you need to do this you need to reconsider your Path.
i have the same problem… The Box was reseted recently. But it didn’t work for me. Maybe i use the wrong Path?
Phew, finally rooted. My hint for those with a shell/RCE and struggling with the flags, learn how to use the powershell version of ls with date filters. From there you get the file everyone is talking about and everything you’ve been trying and reading about will work.
DM for nudges. Just let me know what you’ve tried!
I enjoyed this box, although I had to do my enumeration twice. Once I fixed that it was plain sailing with a tiny bit of Googlefu.
My only hint is, if you feel like you’re fighting it (which feels like every box at the moment…) you’re doing it wrong. Backup, enumerate again and research anything you see that you don’t understand.
Could someone shoot me a nudge? I’ve got a shell onto the box now and I understand how the flags are obfuscated, but I get a crypto error for all three. Have tried with both accessible users, no luck. Can’t find any other files to try.
Could someone shoot me a nudge? I’ve got a shell onto the box now and I understand how the flags are obfuscated, but I get a crypto error for all three. Have tried with both accessible users, no luck. Can’t find any other files to try.
Thanks in advance.
Enum enum enum and PrivEsc, then go back to the files
Having trouble in uploading the file or reverse shell. Any nudges?
Do not use script builtin function because it has problem with large/binary files. Use normal powershell function to download what you need on the victim machine.