Liked this box in the end. Found it easy until I got stuck at a brick wall. In the end I needed to be a little more observant to see the differences to find the right page. Once you find the right syntax for the traditional attack, and then a bit of…
A tricky box, but learnt new things from it. Enum is great, just avoid rabbit holes and read carefully for hints. Google-fu for exploits, if needed, and you'll have root in no time... Sadly it took me a bit of time though.
A tad stuck here. I have user and pass, but unable to find a way to log in at the moment. The obvious way to connect is giving me permission denied (publickey). Am I on the right track or should I be looking for a alternative way?
Working towards root myself. I guess I'm missing a part of enumeration.
Foothold wasn't too bad. I should remember it's quite common to provide new users with temporary business type formatted passwords.