Quick

Good luck everyone!!

MrR3boot
Learn | Hack | Have Fun

«13456712

Comments

  • I'm wondering what kind of exotic vulnerabilities you've prepared for us this time :wink:

  • I like them to be Esoteric this time 😉

    MrR3boot
    Learn | Hack | Have Fun

  • edited April 25

    It's like waiting for Santa Claus :wink:

    sparrow1

  • edited April 25

    nmap is giving me nothing....again. I am sure this is because the masses beat me too it
    nm my phone said released i swear lol
    @Linoge i said never mind brah **__. smh

    catch up...

  • how can you nmap it if it was not released yet ???

  • Type your comment
  • From 10.10.14.1 icmp_seq=9 Destination Host Unreachable
    im waiting

  • Can't wait, all the nmap commands are ready to go wild

  • This is my first time aiming for bloods, good luck everybody !!

    Feel free to message me for nudges and help. If I help you respect is apreciated.

  • Goodluck everybody :)

  • whole lot of f*** and nothing so far ;^D

  • yeah same as me just one port open
    the others are closed or filtred

    any hint ?
    lol from the very first beginning

  • Is the "mobile app" an important hint to access the portal or a rabbit hole?

    Hack The Box

  • some interesting headers, but no idea how to utilize them

  • people are scanning the sht out of this rn

    d4rkm0de

  • edited April 25

    Probably another box with no starting hints from author.

  • Spoiler Removed

  • Did somebody managed to log in?

  • anyone working on e*****e?

    BadRain

  • Type your comment> @BadRain said:

    anyone working on e*****e?

    Yeah... Found something promising, but I haven't found a way to abuse the possible vuln...

  • Type your comment> @Chr0x6eOs said:

    Type your comment> @BadRain said:

    anyone working on e*****e?

    Yeah... Found something promising, but I haven't found a way to abuse the possible vuln...

    same stage as you. but stopped trying for now will look into that tomorrow

  • Type your comment> @f3v3r said:

    Type your comment> @Chr0x6eOs said:

    Type your comment> @BadRain said:

    anyone working on e*****e?

    Yeah... Found something promising, but I haven't found a way to abuse the possible vuln...

    same stage as you. but stopped trying for now will look into that tomorrow

    Yeah I see why you would stop... It's kinda frustrating. So hard to find anything on the web...

  • blood is gone

    BadRain

  • Really frustrating box..fuzzing for hours and got nothing to abuse..i wish it is not another CTF crap.

  • i am looking into that as well, dont give up lol

  • Got some creds, now just looking for a user.

    fun box this far :)

  • hmmm ... so many rabbit holes ... ima sleep on it and then likely wait for the ippsec video :)

    Arrexel
    GWAPT,Security+,VCP,A+,Server+,Linux+,Nework+

  • edited April 27

    Type your comment> @offsecin said:

    Probably another box with no starting hints from author.

    Enumeration is key. If you can't access a site, debug, inspect and maybe even enumerate other protocols

    godylocks

    If you like my advice, please give me some respect! Thanks!
    Message me on discord: godylocks#5721

  • fuzzing is learning too :) I think I should stick with easy machine only wkwkwk :D

  • Just rooted Book, and see a fresh new MrR3boot box! And it's not even midnight yet. :D

    badge

Sign In to comment.