Blog Post
Target 2 conquered (for me the easiest one, for now). For Target 1 and 3, indeed, I know where to look but I'm having a little trouble finding indeed the right exploit for 1 and see how to “talk” to 3 :).
Interesting Labs!
Target1 is to find the right exploit indeed. I needed to find it externally (google) and then copy it to the lab (base64 is your friend).
Target3 you see the hint in another comment :)
- isaias0019 days ago
Bronze I
Late to the party, but already completed all 3 targets!
(Since the cat is already out of the bag... ) steven For future references, you did not have to copy & paste since msf already has a 100% working module >;-)
- steven15 days ago
Silver I
well true, I liked it the hard way :P
- Bluesman26 days ago
Bronze II
I am very close to giving up :): for Target 1 I have tested several exploits (thoroughly) and I have even read the official documentation of the protocol in question!; nothing, zero ... no matter how hard I try I can't get one step further.
For Target 3 I have also tried to enumerate and test tactics. I am left with the option of uploading a shell (I got the credentials) ... but I would like to think that all this is much, *much*, simpler :).
Anyway, congrats on getting all three tokens!. I'm still at it ^^.
- steven26 days ago
Silver I
don't give up my friend :) https://github.com/n0b0dyCN/redis-rogue-server will help you on the first one.. and for target 3: jepp, just PUT the shell up and get in...
- Bluesman26 days ago
Bronze II
'If I've gone further it's because I've stood on the shoulders of giants' ... thank you, steven, for being a giant.
I will resume this lab on Monday, have a nice weekend!.