opening for forest
anyone got a foothold besides the quick user ?
Python Expert | OSCP - Offensive Security Certified Professional | Professional Penetration Tester and Red Teamer Github: https://github.com/J3wker?tab=repositories
nope just got a list, am looking harder
wtf Who gave 20 points to this box
Any hints on root for this ?
Any nudges for user?
I hate windows boxes, really hate them, I'm very weak against windows, I think I need to practice more.
Try!ng Hard3r, N3v3r G!v3Up.
I think I enumerated the l**p service for at least an hour now. Can't find anything. Any nudges for user please?
I'm really struggling to find a way to start on this box... Can someone help me out in the right direction?
I found .. on mf sm l***n
I only got the list of the user Accounts on this machine yet. Stuck on where to go next.
I started brutef** with 7 u***s
Type your comment> @rholas said:
I dont think the user flag is based on bruteforcing at this point. Anyways Good Luck
Type your comment> @rbt said:
Type your comment> @rholas said: I started brutef** with 7 u***s I dont think the user flag is based on bruteforcing at this point. Anyways Good Luck
but all open ports need us* and pass*
Type your comment> @rbt said: Type your comment> @rholas said: I started brutef** with 7 u***s I dont think the user flag is based on bruteforcing at this point. Anyways Good Luck but all open ports need us* and pass*
I'm using rid***m.py to bruteforce all of them rn
Type your comment> @rholas said: Type your comment> @rbt said: Type your comment> @rholas said: I started brutef** with 7 u***s I dont think the user flag is based on bruteforcing at this point. Anyways Good Luck but all open ports need us* and pass* I'm using rid***m.py to bruteforce all of them rn
same with sm lgi with msf
also checked armi***e but not found any e****
This github has a usefull tool to get to user https://github.com/SecureAuthCorp/impacket
Type your comment> @Davincible said:
if you mean for l*****d.py ... I already got all the users using another script. But every port requests password authentication
User was easy - for Root i have no idea so far - I tried many things but none of them work
Type your comment> @j3wker said:
do you have any hint on what to look for in user? I already enumerated the usernames and Im stuck
@rbt no to capture hashes
thanks for the hint. got it
I Liked this box, Great job of the guys who made it!
Any tips for root?
@MrArlen Enumerate what you can do with the user on the box
Can someone give me a nudge. Everyone is talking about different scripts to get a list of users but I don't know where to start. Help is much appreciated!
I used sparta and got the list of users. Still dont know what to do with them though.
Type your comment> @Freak2600 said:
Same I managed to get a list of users but I have no idea what to do with them
@Digsy said: Type your comment> @Freak2600 said: I used sparta and got the list of users. Still dont know what to do with them though. Same I managed to get a list of users but I have no idea what to do with them
@Digsy said: Type your comment> @Freak2600 said:
I was able to get some passwords to but thats alll. So far.
Click here to create an account.
Comments
anyone got a foothold besides the quick user ?
Python Expert | OSCP - Offensive Security Certified Professional | Professional Penetration Tester and Red Teamer
Github:
https://github.com/J3wker?tab=repositories
nope just got a list, am looking harder
wtf Who gave 20 points to this box
Any hints on root for this ?
Any nudges for user?
I hate windows boxes, really hate them, I'm very weak against windows, I think I need to practice more.
Try!ng Hard3r, N3v3r G!v3Up.
I think I enumerated the l**p service for at least an hour now. Can't find anything. Any nudges for user please?
I'm really struggling to find a way to start on this box... Can someone help me out in the right direction?
I found .. on mf sm l***n
I only got the list of the user Accounts on this machine yet. Stuck on where to go next.
I started brutef** with 7 u***s
Type your comment> @rholas said:
I dont think the user flag is based on bruteforcing at this point.
Anyways Good Luck
Type your comment> @rbt said:
but all open ports need us* and pass*
Type your comment> @rholas said:
I'm using rid***m.py to bruteforce all of them rn
Type your comment> @rbt said:
same with sm lgi with msf
also checked armi***e but not found any e****
This github has a usefull tool to get to user
https://github.com/SecureAuthCorp/impacket
Type your comment> @Davincible said:
if you mean for l*****d.py ... I already got all the users using another script.
But every port requests password authentication
User was easy - for Root i have no idea so far - I tried many things but none of them work
Python Expert | OSCP - Offensive Security Certified Professional | Professional Penetration Tester and Red Teamer
Github:
https://github.com/J3wker?tab=repositories
Type your comment> @j3wker said:
do you have any hint on what to look for in user? I already enumerated the usernames and Im stuck
@rbt no to capture hashes
Type your comment> @Davincible said:
thanks for the hint. got it
I Liked this box, Great job of the guys who made it!
Any tips for root?
@MrArlen Enumerate what you can do with the user on the box
Can someone give me a nudge. Everyone is talking about different scripts to get a list of users but I don't know where to start. Help is much appreciated!
I used sparta and got the list of users. Still dont know what to do with them though.
Type your comment> @Freak2600 said:
Same I managed to get a list of users but I have no idea what to do with them
I was able to get some passwords to but thats alll. So far.