So I’m about 91.6% sure about the path to a foothold, I just am having a hard time installing tooling. For those struggling, think of the name of the box and what app is running something like the name, and what we commonly look for to exploit apps.
I figured that part out but I am having trouble putting it against the machine ip
If we’re talking about the same thing, I think we have to modify the payload and the encoding seems finicky to me, but I generally don’t know what I’m going. lol
‘Error “Operation not permitted” while writing config’ What does it mean? I’m on the way to root and it keeps gives me this error when trying to log with t**p. Someone could help me?
‘Error “Operation not permitted” while writing config’ What does it mean? I’m on the way to root and it keeps gives me this error when trying to log with t**p. Someone could help me?
‘Error “Operation not permitted” while writing config’ What does it mean? I’m on the way to root and it keeps gives me this error when trying to log with t**p. Someone could help me?
For those stuck at the priv esc with the error, think about what type of authentication you’re using. Its hard to communicate when you’re out of sync with each other.
Good Machine, going into this machine I did not know what to expect because I never messed with **** or *** before. I have learned a lot from just this one machine so Congrats. Nice little secret code that I didnt know was possible with this language, so that would be useful for the future if I run into it again.
@polarbearer thx for that awesome machine, learnt a lot of interesting stuff!
Hints:
Foothold - read all the stuff you can and think how to check if its safe?
Root - a bit of enumeration and doublecheck if you are ‘synced’.