Rooted. This one was really solid -- 9/10. I've worked with git in the past, but this was a good refresher. Everything was very obvious when I turned my brain off and stopped delving too deep into it.
I normally would give some hints, but I escal…
What's up with some of the poor reviews on this? It was really straightforward and simple -- I actually really liked it a lot. Thank you for the box, @guly.
Enumerate the web service. Check out different web directories to ge…
Type your comment> @Tohzzicklao said:
Staring this stupid insect in the eyes right now... I'm in, but need some clarity. Any nudges?
The stupid insect's eyes hide a valued secret at plain sight (you coul…
Type your comment> @Ryan412 said:
What a wonderful machine
For user: the password is right in front of you. You just need to find the username.
For root: look for what is running and extract its data.
The sha-256 seeme…
Nice and easy box. Thank you @MinatoTW for the quick solve -- I've enjoyed almost all of your boxes so far (except for Ghoul, I'm sorry )... This was a great way of introducing a Windows box to newer users with less environmental familiarity, so I a…
Personally, I run through a box just to root it initially, taking some light notes along the way. After rooting it, I'll go back and verify each of my steps for future reproduction -- this is for a general means of understanding, but also to provide…
Should the form's web dir be enumerated further? I've tried sub-domains, vhosts, web dirs, etc. to locate this binary and I'm not finding it.
Am I functionally stupid...?
Also, congrats @sampriti, you crushed it.
Type your comment> @limbernie said:
Much has been said on the exploit. Write the string you want to execute to a memory address you know is writable and doesn't change. Refer to the memory layout. And no, it's not the stack.
Rooted. Didn't like this box at all -- almost wondering how it even got selected in the first place? Feels like a repeat of another box cough (some will know which I'm referring to).
As others have been saying, provide yo…
Type your comment> @rallyspeed said:
I can find 2 open ports, am i missing a high end port ?
Refer to the "higher" port. Sorry, my description wasn't as accurate as I could have made it. Two ports is correct.
Rooted! And had a great time with it, too. Pretty cool concept for a box
Here are some hints for user/root:
Make sure you pay attention to the service that is running on the higher port. There's one in particular that you can abuse spec…
Type your comment> @johnnyz187 said:
Is it just me or is there something wrong with the exploit?? I understand what I have to upload and my script to the .o** is correct, but every time I execute it, I get nothing?? Is there another attack…
Type your comment> @KeyboardCaper said:
After getting a terminal:
python -c 'import pty; pty.spawn("/bin/bash")'
stty raw -echo
(In case of unknown terminal type try: linux)
Type your comment> @BaiduFu said:
After fg, ctrl+z cannot background the shell ?
You did it backwards. fg stands for "foreground", meaning you'll be foregrounding the job you just "backgrounded" with CTRL+Z.