The first vuln seems almost too obvious, but I can't come up with a working proof in spite of all I've read about related exploits. Feels like I've read too much in one sitting and lost focus.
Does anyone have a lead on some good study material?
I sadly ran out of steam last night without realizing I already had permissions for both root methods (RIP points), but I still wanted to pop in and say I really enjoyed this box.
Being able to discover things slightly out of order, figuring out ho…