Saturday, August 30, 2014 Login · Register
    Login
Username

Password


Remember Me

Not a member yet?
Click here to register.

Forgotten your password?
Request a new one here.

 

    Users Online
  • · Members on IRC: 32   
  • · Total Members: 15,974
  • · Newest Member: sacha
  •  

     

        Related Ads
     

     

     

        Top 10 Forum Posters
    UserPosts
    bluechill1411   
    madf0x1291   
    cruizrisner1062   
    Qwexotic1034   
    Null Set870   
    Override604   
    auditorsec603   
    godofcereal599   
    TurboBorland585   
    Teddy477   
     

        Affiliates




  • iExploit


  • iExploit


  • WeChall





  • Thisislegal.com

  •  

        Related Ads
     

    View Thread
         
    Security Override Hacking Challenges Privilege Escalation Hacking Challenges
    Is PrivEsc 1 working like this?
    Register FAQ Members List Today's Posts Search

    Print Thread
    07-04-2013 12:03 PM Is PrivEsc 1 working like this? | Edited by CrashOverron 07-05-2013 12:11 PM
    Hello everyone,

    I'm working on PrivEsc leval 1 while I'm looking at the [deleted] vuln.
    Is it what im supposed to use?
    [deleted]
    Why it doesn't work?

    thanks,
     
    Offline
    07-04-2013 12:45 PM RE: Is PrivEsc 1 working like this?
    It works.
    And what you've posted is a spoiler.
     
    Offline
    07-05-2013 07:47 AM RE: Is PrivEsc 1 working like this?
    @shi_yi, while solving the challenges you should understand and keep in mind is that the vulnerabilities shown are not real ones (else a bad guy can abuse them) but are emulated form of those real world vulnerabilities.

    they are simulated through programming and therefore need a distinct answer or style to get through.....
    Try to think on what the developer of challenge would have put in..... and you would be through.....

    Smile....Even IMPOSSIBLE says I m possible.... Smile

    And with knowledge comes responsibility.
     
    Offline
    07-10-2013 10:04 AM RE: Is PrivEsc 1 working like this? | Edited by schema 07-10-2013 05:49 PM
    I am having priv esc problems too. I know it is simulated, so normal knowledge of telnet breach doesn't apply. If it is working, I'd appreicate a hint or two
    The instruction at "0x1005z2db" referenced memory at "0x00000000". The memory could not be "read". Press every key with your forehead to terminate the program.
     
    Offline
    07-10-2013 10:46 AM RE: Is PrivEsc 1 working like this?
    PM me what you're trying.
     
    Offline
    07-10-2013 12:59 PM RE: Is PrivEsc 1 working like this?
    Through the login panel you get to know some handy informations like the OS and (Server Version I think)
    What would you do first in a real scenario?
    Join our IRC channal! irc.evilzone.org #Evilzone #SecurityOverride

    This dude doesn't answer to PM..no matter how special you think you are...sry

    "With great power comes great responsibility"
     
    Offline
    07-10-2013 03:10 PM RE: Is PrivEsc 1 working like this?
    I was trying to cheat. I beautified the source. I'll take a different approach.
    The instruction at "0x1005z2db" referenced memory at "0x00000000". The memory could not be "read". Press every key with your forehead to terminate the program.
     
    Offline
    07-10-2013 05:52 PM RE: Is PrivEsc 1 working like this? | Edited by schema 07-10-2013 05:56 PM
    Teddy wrote:
    Through the login panel you get to know some handy informations like the OS and (Server Version I think)
    What would you do first in a real scenario?


    In the real world most systems are patched and up-to-date. I attempt to brute my way in. The vuln in this simulation is well documented, so i assume it has to be the correct method. I am not having much luck with it though. If i am doing the right method, then it requires more characters than can fit into one line. That is my current dillema. Could I get another clue?
    The instruction at "0x1005z2db" referenced memory at "0x00000000". The memory could not be "read". Press every key with your forehead to terminate the program.
     
    Offline
    07-10-2013 06:10 PM RE: Is PrivEsc 1 working like this? | Edited by steg7 07-10-2013 06:14 PM
    You can use www.google.com to look for exploits.
     
    Offline
    07-10-2013 07:04 PM RE: Is PrivEsc 1 working like this?
    steg7 wrote:
    You can use www.google.com to look for exploits.



    thanks. I hadn't thought of that.




    is there a special function to keep a line from breaking?
    The instruction at "0x1005z2db" referenced memory at "0x00000000". The memory could not be "read". Press every key with your forehead to terminate the program.
     
    Offline
    07-10-2013 07:21 PM RE: Is PrivEsc 1 working like this?
    I just typed it in by hand...
    dmr, September 9, 1941 October 9, 2011

    Never Forget
     
    Offline
    07-11-2013 08:41 AM RE: Is PrivEsc 1 working like this?
    schema wrote:
    steg7 wrote:
    You can use www.google.com to look for exploits.



    thanks. I hadn't thought of that.




    is there a special function to keep a line from breaking?


    That didn't create a problem for me. If you're still having trouble, maybe it's something else.
    "Buy the ticket, Take the ride."
     
    Offline
    07-11-2013 10:10 AM RE: Is PrivEsc 1 working like this?
    StevenSkytowr wrote:
    schema wrote:
    steg7 wrote:
    You can use www.google.com to look for exploits.



    thanks. I hadn't thought of that.




    is there a special function to keep a line from breaking?


    That didn't create a problem for me. If you're still having trouble, maybe it's something else.


    I think it is something else. I really do not know how to write overflows, and I do not understand this vulnerability. I am going to keep trying though. Its the best way to learn.
    The instruction at "0x1005z2db" referenced memory at "0x00000000". The memory could not be "read". Press every key with your forehead to terminate the program.
     
    Offline
    07-11-2013 01:05 PM RE: Is PrivEsc 1 working like this?
    You shouldn't have to write any code do some more research into the vulnerability.
     
    Offline
    11-19-2013 04:54 PM RE: Is PrivEsc 1 working like this?
    can someone retest and confirm that priv esc level 1 is doable? Ive tried many different forms of the found exploit without success :/
     
    Offline
    11-20-2013 05:13 AM RE: Is PrivEsc 1 working like this? | Edited by MyYe 11-20-2013 06:01 AM
    Hint: it must be an existing user. Also the last space might screw it up.
     
    Offline
    11-20-2013 06:31 AM RE: Is PrivEsc 1 working like this?
    woah, it works now, thanks a lot
    Im sure I have tried this before too, so in case someone fixed it recently, thanks!
     
    Offline
    11-21-2013 02:28 PM RE: Is PrivEsc 1 working like this?
    I logged in successfully but the only commands that were working from what I tried were ls and cat. I couldn't cd to the directories that appear on the screen, or directly cat what I would think is interesting from them. Is there something obvious that I'm missing / overlooking?
     
    Offline
    11-22-2013 02:31 AM RE: Is PrivEsc 1 working like this?
    cd folder/ doesn't work

    cd folder works

     
    Offline
    11-22-2013 06:25 AM RE: Is PrivEsc 1 working like this?
    Haha I didn't try that *self slap* ok, I got it now, thanks for the info!
     
    Offline
    Jump to Forum:
    Forum powered by fusionBoard