@astrozombie said:
Curious of what spoiler I posted?
I’ve no idea and people do report things for varied reasons. If you mentioned a CVE number or specific exploit it is likely to be reported.
@astrozombie said:
Curious of what spoiler I posted?
I’ve no idea and people do report things for varied reasons. If you mentioned a CVE number or specific exploit it is likely to be reported.
Type your comment> @TazWake said:
@astrozombie said:
(Quote)
I’ve no idea and people do report things for varied reasons. If you mentioned a CVE number or specific exploit it is likely to be reported.
Thanks for the reply. I didn’t have anything like that but wanted to ensure I’m not breaking any rules here inadvertently. I try to keep it pretty vague with any hints.
Cheers
Type your comment> @TazWake said:
But there’s a lot of data to work through. Unfortunately, this is realistic - you might do a pentest and land on a box which has 30 user’s documents and you have to go through terabytes of tedious stuff to see if they’ve left credentials out.
Not only is this a fair hint, it is an absolute must for a solid PenTest methodology. Thank you @Tazwake
In an attempt to follow the guidance with my own hint: as you progress to each user, pretend you are home shopping, look in every corner.
Great work @ChefByzen for this box.
Rooted! I really enjoyed this one, a much needed linux box after tearing my hair out on a couple windows boxes.
PM for nudges
Rooted.
Whilst the foothold and the users were a good teaching, I think the root was a bit on the CTF side of things. After many enumeration scripts returning nothing, how on Earth should that path be visible?
I was out of hairs when I tried something dumb and it resulted in a good privesc blog post, tbh.
Rooted.
Very interesting machine! Thanks @ChefByzen for your work. Also thanks for @thegingerninja, @TazWake and @gunroot for hints :3
I’m totally stuck on getting root. I got user 2, saw something interesting on .v****** but I can’t get how to exploit it! Any hint will be highly appreciated!
Nevermind, just rooted it
PM me if you need a hint!
@mindframe said:
I’m totally stuck on getting root. I got user 2, saw something interesting on .v****** but I can’t get how to exploit it! Any hint will be highly appreciated!
I dont know about that. My path was to enumerate, find something which allowed me do something as someone else, then I found a write up on how to use it to do something which wrote something to a place where I could use them to get priv access…
Cool box, nice flow with interesting method of obtaining root, PM me if you need a nudge.
Just got root. Thanks @ChefByzen for this great box! Definitely learned something from it.
P.S: I don’t know some people are not relating the name of the machine with the process to get root. It totally makes sense to me.
P.S: I don’t know some people are not relating the name of the machine with the process to get root. It totally makes sense to me.
Afterall it is even funny -
However finding it was definitely not easy. A new thing for me.
I think this was one of the fastest boxes I have ever rooted (a definite record for user for me). As always, learned new things from the box, especially regarding certain services. Many thanks to @ChefByzen for an entertaining box.
So, here’s my hints:
INITIAL
USER
USER 2
ROOT
Let me know if there are any spoilers and I’ll remove them.
As always, PM me here or on Discord. Don’t forget to tell me your progress so I can avoid spoilers.
Rooted !
I actually rooted it the first time because someone dropped a very sensitive file in /tmp, and I thought that was it… Stupid me, lol. Nonetheless, please clean up your workplace before leaving.
A friend of mine told me that wasn’t supposed to be the way, so I went back to try and see if I could do it without benefiting of someone else’s carelessness.
And I did ! For some reason it took me ages to get the command to work fine, but eventually I got root.
Fun box, thanks @ChefByzen !
Oh, and I agree that the name of the box is very related to the way you become root. Maybe it makes more sens in some languages than others ?
@crash0 said:
Rooted.
Whilst the foothold and the users were a good teaching, I think the root was a bit on the CTF side of things. After many enumeration scripts returning nothing, how on Earth should that path be visible?I was out of hairs when I tried something dumb and it resulted in a good privesc blog post, tbh.
Congrats on rooting it!
I’m glad you were able to learn something about manual enumeration and finding user files scripts don’t have all the answers… And they’ll likely get you caught if you’re not careful with them.
Is anyone else having problems with the box always being down. Its been one complete day and I couldn’t even perform a proper enumeration because the box is always down.
Really fun box, taught me to always go back to basics, never overlook them. PM me if you’re stuck.
Type your comment> @blacViking said:
Is anyone else having problems with the box always being down. Its been one complete day and I couldn’t even perform a proper enumeration because the box is always down.
There is Fail2Ban implemented. If you bruteforce anything it will ban your IP for couple of minutes.
Hi Guys,
After getting in any hints for 1st user ?? Have stuck a bit…
@xxTMGxx said:
Hi Guys,
After getting in any hints for 1st user ?? Have stuck a bit…
It really depends on where and why you are stuck. Visit in a browser, read the links, found out whats there, exploit it, get a shell.