Type your comment> @gregX01 said:
> Looking for root hint, I have the source and have been poring over it but I think I miss some part/info that is important for decryption. Anyone care to shed some light?
The answer is in your question.
Type your comment> @dr0ctag0n said:
> I must be missing something obvious because I don't see any way at all to get the remote machine to do anything.
Focus not on what to get the machine to do, but what you can get from the…
Type your comment> @KostasKoutr said:
> As someone who has done 12 boxes so far, do you think this box would be too difficult for me?
> I am interested because, although I have found RCE (so the OS and some certs etc.) a bit too …
> @Ac1d0 said:
> Rooted the machine with the unattended LPE exploit.
> Also @AuxSarge please delete the symlink that this exploit creates, since other users could use it by simply typing a command (pwn**).
> Someone who root…
For those stuck on this box, there are lots of good hints and insights on this thread. Take the time to read all of the posts. My hint: Priv escalation is about using a protocol and set of tools that you use EVERY DAY but maybe you don't understan…
I would like to point out that my initial concept for this challenge was, while *nix based, pretty much OS agnostic. I actually settled on the OS I did because I haven't seen it here and I thought some of the OS-specific stuff might give an interes…
I have a Y/N question: Has anyone gotten initial access to this box by using MSF to both generate payload and host server for remote shell? I can see with wireshark that at least part of my payload is executing but the remote shell is not happening.