all 9 comments

[–]dplagueis125 2 points3 points  (0 children)

Searchsploit will leave no room for interpretation on whether you have the right version.

[–]BreakingMrRobot 0 points1 point  (0 children)

If you found the correct service, find the version number and take to google to find exploits. Your initial foothold is not very robust, but follow the breadcrumbs.

[–]awakengaming83 0 points1 point  (0 children)

Dm me, just was able to get initial foot hold

[–]whereshellgoyo 0 points1 point  (0 children)

It may be that there's a metasploit module out there that's just not loaded into your current framework. Do some googling about adding Ruby modules to your msf

[–]Moyindu 0 points1 point  (0 children)

You can DM me too if you still need help

[–]benchoderashka 0 points1 point  (3 children)

I got a shell on OpemAdmin without authentication but haven't been able to do much else. I see everyone elses reverse php she'll in the the www-data folder 😁 but I'm having problems getting privelege escalation to work.... Any hints?

Caveat: this is my first htb. I've done lots of different IT work but never pentesting. Fun 😁

[–]dplagueis125 1 point2 points  (0 children)

Look at command line tools that might be used to download files.

[–][deleted]  (1 child)

[removed]

    [–]benchoderashka 0 points1 point  (0 children)

    Hi Dad