Hi do you still need help on beatles?
I haven't finish it right now just one step to end with it, but may be I can give you a hint to go close to the final step.
about beatles, you have to use stegano tools on the pic, no need to dcode the semaphore ;-)
Hi Mbenzan, i tried to do metasploit on Jetty 9.4.z-SNAPSHOT in Jeeves, but cannot get the meterpreter, which exploit should i use, can you please help me , stuck for long time.
Hi FhlipZero, also tired, unix/local/chkrootkit exploit and ntfs-3 exploits, but failed in nibbles.
Hi FhlipZero, please help me in root for Nibbles, is there somthing to do with monitor.sh, found by sudo -l , any hints please, stuck for root more than 5 days.
saw you commenting on the bashed priv esc forum. I've trying to get root for over a day now and can seem to find anything significant. Was wondering if you could point me in the right direction. I have rev shell and have ran priv esc enum scripts as scriptmanager. Thanks
On Calamity, I can see I can point EBX where ever I want. Reconstructing Hey and point EBX to it would seem like an approach but difficult with the the TV in it. The ASM at the beginning looks to be marking a small portion at RX, Whoopsie is set and of course the or'ing of the TV value to get rid of nulls suggests a future STRCPY. Am I correct about needing to point EBX somewhere else or am I off track? Thnks
greeting mate! question about Mirai... i get that root.txt was deleted from the usb, so i used testdrive on /dev/sdb and find the file, but it's of length 0...any suggestions?
i tried /dev/sda but its of type ISO...
I am a newbie. Just owned few easiest machines and 2 retired machines. As a beginner I stuck in many stages of hacking. I am preparing for OSCP. Can you give me some tips/tutorials for that?
Short intro about me
I am a BE graduate doing MSc Cyber Security. Got CEH certificate and planning to improve my skills and prepare for OSCP.
Thanks in advance...
Web | Programmer
Hi lowpriv, sorry for the help, can you please help me in sense, i got login and found that command injection shold be done on status_rrd_graph_img.php, but i am not able to do it, please help me, i am so sad after spending 7 days in this sense. i got one report on the same https://www.proteansec.com/linux/pfsense-vulnerabilities-part-2-command-injection/, but not able to hit it.
now its more than 5 days i am enumerating looking for particular entry point to exploit root , but no luck. : ( i feel i tried everything . Any specific directory name to exploit vulnerablity
please help me
Hi Agent22. Can you give me hint what is the extension will be used to brute Shocker cgi-bin directory. I used many wordlists and extension of Dirb.
too brainfucked with finding the deleted root file. any suggestions please? is there any hidden binary stored somewhere! if yes, hint on where it might be?
Any hint on pri ecs
i am using meterpreter connection .
Hey! I've been working on Solid State machine lately. Can you help me with it?
Hi Agent22, can you please help me on Sense, i am able to login to the pfsense portal, but stuck there, how to go forward, i got many pages once i spider it using burp, i have a doubt on graph.php, but how to do command injection here ? Need some help, tried many days, sorry for the help.
In order to register, you have to be a member of Hack The Box. Registration is initiated from there.