Hi everyone, this is actually my first post in here. Anyway I’m trying to get a shell as root on the system but when I run the exploit I get an error message saying that “libgo.so.16:” doesn’t exist on the system. I am apparently doing everything correctly and can’t figure out why this is happening. Can anybody help me with this? Thank you in advance
Nevermind. I manage to get root!!! For those of you who are coming across the libgo.so.16 missing, just update golang on your machine and recompile the exploit.
FInished this box. Learn some new things while finding my way to get the initial shell. For root, you just need to make sure to follow the indications of the exploit.
Foothold and User were relatively straightforward.
Interception and tampering
then enumeration.
I am currently hitting a wall on root though. I think I have the right exploit to use (and it seems to work) but the payload isn’t throwing a shell. On the plus side, go is a really easy to understand language.
Finally resolved it. Turns out I just needed to change the thing I was calling.
I have the same problem as you:“I think I have the right exploit to use (and it seems to work) but the payload isn’t throwing a shell.”
How did you resolve it?
I was stuck on foothold for so long, wondering why it wasn’t working, only for me to figure out that it was because I was using the wrong email address. Needless to say, I’m embarrassed lol
My PMs are open if anyone wants nudges for foothold! I’m online most of the time
edit: Rooted! (kinda). Got the flag but couldn’t figure out how to get a full connection back. Would love to run my attempts by someone to see what I was doing wrong!
DM me if you need any advice on getting root flag!
I think i have arrived the last step , I executed POC normally, but I didn’t get shell back.Can you help me ? Thanks a lot!
I have the same problem as you:“I think I have the right exploit to use (and it seems to work) but the payload isn’t throwing a shell.”
How did you resolve it?
Nevermind. I manage to get root!!! For those of you who are coming across the libgo.so.16 missing, just update golang on your machine and recompile the exploit.
I have the same problem as you:“I think I have the right exploit to use (and it seems to work) but the payload isn’t throwing a shell.”
How did you resolve it?
I needed to tweak the payload.
I have solved ‘/bin/sh’ is right in the second session
i got to the admin and read the notes that are there.
i know where i should be at in the directory and what file to look at (somewhere around the .bak files), however i can’t open that one important file because it is compressed and i can’t unzip it because i don’t have permission as i am neither a user or root.
how did you manage to open that file :s help, thank you team
Nevermind. I manage to get root!!! For those of you who are coming across the libgo.so.16 missing, just update golang on your machine and recompile the exploit.
Thumbs up for that hint!
What version of golang are you using?
I’ve used and updated it to version 1.16.5 but I still get “error while loading shared libraries: libgo.so.16: cannot open shared”.
Nevermind. I manage to get root!!! For those of you who are coming across the libgo.so.16 missing, just update golang on your machine and recompile the exploit.
Thumbs up for that hint!
What version of golang are you using?
I’ve used and updated it to version 1.16.5 but I still get “error while loading shared libraries: libgo.so.16: cannot open shared”.