Wall

Type your comment> @Thms84 said:

Please PM me if you have a useful hint. Got all the pages, yes I got the ‘doc redirected’ as well. This box is irrational, comments above prove it. Yes Teacher/yes GET# etc, still can’t get a foothold. :@

Never mind, I give up. Does not worth the time.

Well, my native language is not English, so it’s hard for me to guess which page I should access with these tips. Is there a technical way to find this page that starts with c? I mean, is it possible to find it with some Kali wordlist, for example?

What I have so far are the three already mentioned.
a*.***
p****.***
m*********

I’'ve done all kinds of requests that can be made with the protocol, and nothing.

Edit: Just to explain, the tips are language independent, I was making a typing mistake. =/

I’'ve done all kinds of requests that can be made with the protocol, and nothing.

Which ones specifically? Did you not get any extra information from them?

Type your comment> @rowra said:

I’'ve done all kinds of requests that can be made with the protocol, and nothing.

Which ones specifically? Did you not get any extra information from them?

PM you.

Edit: Thank you @rowra and @argot !

augh!! any hints on the c******* login credentials? i know it is supposed to be easy but I have gone through all the plainly obvious ones…

Type your comment> @krisd4 said:

augh!! any hints on the c******* login credentials? i know it is supposed to be easy but I have gone through all the plainly obvious ones…

Are you sure about that? If you rock the authentication, you should gain some useful information.

@godzkid said:
Type your comment> @gorg said:

as far as I can tell, the credentials provided on the developers webpage, don’t work

reading this discussion it is said that they are really simple

hmmm

i am inside c****
just exploit not working

hw did u get in ?

Type your comment> @hackerst34k said:

hey @krisd4 how did you find that c****** login pages because i tried every wordlist but i didnt find any directory starting with c*****

refer to the teacher hint…“verbs” can be an attack vector by teacher especially when u r in an English class.

am stuck on /c****** creds
i can’t find them on developers webpage as said
please any hint ?

terrible. i stuck on finding /c****** to and need help. please !

Spoiler Removed

Spoiler Removed

Type your comment> @krisd4 said:

you could describe the METHODS using only about six VERBS, if you GET what I am saying…

that’s almost spoiling :wink:

Type your comment> @rheaalleen said:

https://www.youtube.com/watch?v=7NjNL4Nsa4Q

Loving the box so far

From that video, it’s almost as if you were suggesting that we now turn to the pols.

Got the login, but exploit isn’t working.
Do we have to modify the exploit? Tried various rev shells methods, nothing seems to work

@Splinterdav hint for user/pass combo?

Type your comment> @Splinterdav said:

Got the login, but exploit isn’t working.
Do we have to modify the exploit? Tried various rev shells methods, nothing seems to work

Yes, a modification is needed, but I’m having trouble with the correct rev shell too xD

Type your comment> @krisd4 said:

@Splinterdav hint for user/pass combo?

Well, it is pretty common. I guessed it by trying basic high priv usernames with passwords from a common password list.

struggling from the rce i can’t get rev shell
any hint ! :cry:

anyone who has rooted it please pm me
i am struggling to get the correct payload to get reverse shell to get command execution
help me