Rooted. The exploit in the laboratory was patched in this version, but a few hours ago a working script for the foothold was released, so… it makes the machine even easier…
For “user”: read files and login
for root: read the other files again and notice the true path. You can do this at least in two ways
Not a bad box. I’ve had enough of gitlab for a bit, though. User is easy if you find the right info online, and root is a standard d***** escape technique. Thanks!
In need of a tiny nudge on the e***** if anyone’s feeling generous to get me out of the rabbit hole I think I am in. Got the second half of it worked out (I think), just can’t get to where I need to be permission-wise to use it!
I was able to get the user flag, but I am stuck on how to move forward. I’ve tried many ways to escape to root but I am struggling. Can someone PM me a nudge? Thanks in advance.
Hey Guys, could I ask for a nudge oon upgrading the initial shell, having real troubles with it, i’m starting to think that its due to me using ZSH in Kali2020.4 as when backgrounding a task and foregrounding it everything seems to go to s***
Root : there is different ways to escape from d*****, there is one that works for sure (proc*****) it is universally u***** identifier (u***),
don’t overthinking with 4 commands you got the root
@Cyberzombi3 said:
Hey Guys, could I ask for a nudge oon upgrading the initial shell, having real troubles with it, i’m starting to think that its due to me using ZSH in Kali2020.4 as when backgrounding a task and foregrounding it everything seems to go to s***
the usual upgrading of a reverse shell doesnt work with zsh.
The easiest fix is to just start your nc listener from bash not zsh.