@3rpleThr3at said:
Or can we use Rock**uâŚor is the default wlst suffice?
It should crack pretty quickly. You may have added superfluous data.
Just to confirm, does your hash begin with a b
and end with an a
?
@3rpleThr3at said:
Or can we use Rock**uâŚor is the default wlst suffice?
It should crack pretty quickly. You may have added superfluous data.
Just to confirm, does your hash begin with a b
and end with an a
?
Just to confirm, does your hash begin with a
b
and end with ana
?
That is correct. I took out the extra fluff. Nothing more than the hash string in the text file while JR confirms the hash type as it is declared in the sf file.
As opposed to everybody else here, user was easy but root took me ages, so here my 2p:
Hope that helps somebody. PM if youâre really stuck.
Easy machine . Thanks to @mrb3n for the box.
C:\Users\Administrator\Documents> whoami
remote\administrator
If anyone needs help, be free to pm me
Getting ââNoneTypeâ object has no attribute âgetitemââ from the PoC,
can someone help me fix this clock problem? I cant get it to work
Stuck on root, have found the S****c you are meant to abuse, but fails to start every time?
Type your comment> @COVID19 said:
Stuck on root, have found the S****c you are meant to abuse, but fails to start every time?
Your name is COVID19
Thatâs funny man
Rooted earlier, fun box, learnt a lot. Thanks.
Type your comment> @COVID19 said:
Stuck on root, have found the S****c you are meant to abuse, but fails to start every time?
same⌠says successful execution⌠but no privileged shells
@evelbit said:
Type your comment> @COVID19 said:
Stuck on root, have found the S****c you are meant to abuse, but fails to start every time?
same⌠says successful execution⌠but no privileged shells
Maybe they finally fixed the unintended way
Finally rooted the tv way, a bit obvious what to do with all the payload laying around the actual website. Overall a greatbox by @mrb3n
Stuck at root, using the TV method. Found the password !******* but am still unable to connect using TV. Feels like Iâm missing something. Any nudge is appreciated.
Rooted both ways.
US - a certain Windows enum tool shows that you have full permissions to this item. Check the fuzzy priv esc guide on what to do to get the reverse shell. Mine only lasted long enough to copy/paste a command to print the root flag. If you have suggestions on how to stabilize this, I would love to hear them.
TV - EDB exploit doesnât work since the pre-req is not installed on the target. Check a similar framework for tools to help with this. Once you get a pw, try using them on a high port to get admin (have you heard of the evil tool?).
Finally rooted.
Users - find a way to obtain files and read it (donât just look at low ports). If you found an exploit, donât make too many changes - try understand the poc.
Root - Basic enum (link below), and with the point found, google is your best friend. Dont forget the evil.
I hope I didnât say too much.
link for basic enum: Windows Privilege Escalation Guide
Pm-me for the other way to root it. Thx
Having issues cracking the hash from the s*f file. Any hints.
Type your comment> @Sc0rp10n said:
Having issues cracking the hash from the s*f file. Any hints.
do u mean the first hash or where are u at? google can be your friend
@LinkSmasher said:
Stuck at root, using the TV method. Found the password !******* but am still unable to connect using TV. Feels like Iâm missing something. Any nudge is appreciated.
you can always try on different service