it was one of those machines where i would poke around a lot after getting the root flag to try out things beyond getting the flag. Always a sign of an interesting machine.
Getting root also took me some time, but it was very rewarding in the end and a great experience.
Type your comment> @TazWake said:
It is also one of those boxes where just as you think youâve finished, you realise you havenât.
I can sense what you thought that time. ?
Rooted. This was fun and educational. It is amazing that we always learn something new even though it seems there is you know everything about specific application
Thanks @purplenavi for nudges.
Rooted!
Question, for the exploit writeup from a blog about the RE vuln, are we supposed to receive error messages as shown in the writeup? Burp doesnât return any s***** errors if you direct it to the wrong location for me
Type your comment> @m0zzare11a said:
Question, for the exploit writeup from a blog about the RE vuln, are we supposed to receive error messages as shown in the writeup? Burp doesnât return any s***** errors if you direct it to the wrong location for me
From my experience it doesnât cause expected error 500 for random location. You only see an exception if payload âworkedâ.
Aite thanks! Had me wondering if I got the correct vuln for quite a bit
What a ride. The user was super! and Root was awesome too. If you read the bible for CTFs carefully you will find everything.
Excellent box. finally rooted! the tips in here are everything you need, donât be afraid to get creative
Upload successful! The report will be sent via e-mail.
no report!!! i got :neutral:
@scorpion4347 said:
Upload successful! The report will be sent via e-mail.
no report!!! i got :neutral:
You dont want a report, you want a shell.
i mean reverse shell not connecting!!!
@scorpion4347 said:
i mean reverse shell not connecting!!!
Ok - you might want to work on identifying why this is happening or at least more detail about what could be the problem. Simply having a shell fail to connect isnât something people can really help with.
For example, there are countless reasons why this might be the case:
- Youâve used the wrong payload
- Your payload has a typo
- Your payload hasnât been put in the right place
- Your payload isnât being called properly
- Your attack is hitting the wrong place
- Your listener isnât working
- Your listener is expecting something other than what the payload is sending
- You have a typo in the listener
- Your firewall is blocking connections
(etc - this could go on for days).
This is a hard box, so it does need some trial and error to get attacks working. You need to be comfortable working through what you are trying to do so you can understand where a problem might have occurred. (and remember, if you are too open about what you are asking on the public forum it will get hit for a spoiler)
Rooted !
Feel free to pm me for nudges
Rooted. Fun box, not too hard for a hard box but definitely not easy.
PM me if you need a nudge but be prepared to tell me what youâve tried first.
Rooted, good box with lot of learning points.
Let me know if you need any help but tell what you tried to avoid me any spoil
path is web link without security ???
Pretty sure I am looking at the intended exploit. Can someone point me to some good reading material for the exploit?
Iâm not able to get the required code for SUCCESS
Edit: Rooted the box
root@VirusBucket:~# whoami;id;hostname
root
uid=0(root) gid=0(root) groups=0(root),1(daemon),2(bin),3(sys),4(adm),6(disk),10(uucp),11,20(dialout),26(tape),27(sudo)
VirusBucket