OK so far I've tried not to follow the various hints that are currently being given but to
try first what i think might be the 'reasonable' exploit (line 26 in that same file that
the error is given us plus the "cleaning" method on the sam…
could use a hint on root, I do know what I should do, not sure HOW.
(currently working aggressively with a bash script that will add my own .*ub
to that file based on its name pattern.
I'm pretty sure this is not the way.
I knew i w…
Oh well, I’m calling it for the day.
I’ve managed to get RCE but no shell.
I could definitely dump the ***ql with all it’s content, I’ve used mannnny bypass those disabled functions but I’m still not sure what to look for.
I didn’t quite understand…
Type your comment> @imimo said:
there's no hidden message if that's what you guys referred too.
the workflow is a bit tricky at first, but once you realise what each
system is responsible for - you shouldn't have any issues.
Type your comment> @wardrive said:
So although I'm not using the same "Lady" you used, I'm using the dragon himself,
and also notice the so called "username" and it family name, and other bunch of stuff. could use a …
ok so got user. and I want to mention couple of things here -
* There is more then one way to get user.
* I've noticed an issue with the id_*** file. i was getting "bad format" when trying ssh with our friend de**** via ssh. what's worked…
ok, so after a lot of trials and errors, i finally got shell.
currently working on user. it seems a bit tricky i guess since you're inside
a con*****. i found some things that
the seed script gave me, which are not giving away things.
I did found t…
back again working on the machine.
i'm encountering some weird stuff -
sudo do**** ex** -it aimforthehead bash
i'm getting kicked out after a minute with no options to change the sec****.y**
file or run the train console.
is there any work…
Type your comment> @HomeSen said:
yup, same exact situation, BUT, as our fellow @TazWake always says - try and used the loot in other services.
I'm currently trying to understand the usage of libex** with that 3*** port.
I believe I made some progress here -
I've replace the sXXXXX_XXy_XXXe that i got using the exploit with the one in my environment in my dXXXXX-cXXXXXX.yXX
Next, i got into gXXlXX environment shell in order to get the train console,
Once I've got t…
so i pretty much understand what's the workflow should be, but i'm still getting
the 500 Internal empty (without the desired output within), and i'm still don't understand
why is it.
What am i missing ?
it would be great if someone could PM me (: