I think it’s not fair to participate in such an awesome learning experience, that is - on top of that - offered for FREE and then shit all over their rules.
These kinds of rules must be written in the front page !
A hacker won’t go to the rules page and read all the rules !
anyway i deleted my video from my youtube channel and from my mediafire
Good Luck in whatever you do
Let me just state, that you are free to post solutions and walkthroughs on Retired machines.
We will retire one every time a new one is released to keep always 20 machines that will count for points. The retired ones will be available but not give points to solvers.
How do I escalate privilege on Windows 2012 R2 (Build 9600)?
I’m working on OPTIMUM machine and I have owned the user (which was easy)
Payload: windows/meterpreter/reverse_tcp
When I try to use getsystem, I get
[-] priv_elevate_getsystem: Operation failed: The environment is incorrect. The following was attempted:
[-] Named Pipe Impersonation (In Memory/Admin)
[-] Named Pipe Impersonation (Dropper/Admin)
[-] Token Duplication (In Memory/Admin)
Also when I try hashdump , I get:
[-] priv_passwd_get_sam_hashes: Operation failed: The parameter is incorrect.
Yeah, PrivEsc is a bitch on those machines.
There’s a machine that’s very similar to Optimum (in the way you get a shell) - don’t remember the name rn - but you will have even LOWER privileges than on Optimum.
I’ll just leave this here, maybe you can give me a tip on how to get system once you’ve figured it out.
I haven’t gotten a root shell on optimum yet.
But someone on Slack told me you have to modify the exploit, he did not say which, but im conficent it’s this one.
If anyone else has rooted optimum, please chime in.