Skip to main content
  1. Posts/

Blurry

·92 words
Table of Contents

Blurry
#

lesgo

User
#

nmap

clearml

I tried a random name “admin” and got access to the dashboard

dashoard

exploit1
Found this exploit

exploit
Followed the instructions had to install clearml myself and a few other steps

foothold
Then i had foothold and user!!

user.txt

Root
#

linpeas
I ran linpeas (You could also run “sudo -l” ) and it told me i could run “/usr/bin/evaluate_model /models*.pth” as root

evil.py
I created this python file that created a .pth file and all the .pth file did was cat root.txt

root.txt
Then we got the root.txt

pwnd
And thats pwnd.

Thank you for reading