Probably another box with no starting hints from author.
Spoiler Removed
Did somebody managed to log in?
anyone working on e*****e?
Type your comment> @BadRain said:
anyone working on e*****e?
Yeah… Found something promising, but I haven’t found a way to abuse the possible vuln…
Type your comment> @Chr0x6eOs said:
Type your comment> @BadRain said:
anyone working on e*****e?
Yeah… Found something promising, but I haven’t found a way to abuse the possible vuln…
same stage as you. but stopped trying for now will look into that tomorrow
Type your comment> @f3v3r said:
Type your comment> @Chr0x6eOs said:
Type your comment> @BadRain said:
anyone working on e*****e?
Yeah… Found something promising, but I haven’t found a way to abuse the possible vuln…
same stage as you. but stopped trying for now will look into that tomorrow
Yeah I see why you would stop… It’s kinda frustrating. So hard to find anything on the web…
blood is gone
Really frustrating box…fuzzing for hours and got nothing to abuse…i wish it is not another CTF ■■■■.
i am looking into that as well, dont give up lol
Got some creds, now just looking for a user.
fun box this far
hmmm … so many rabbit holes … ima sleep on it and then likely wait for the ippsec video
Type your comment> @offsecin said:
Probably another box with no starting hints from author.
Enumeration is key. If you can’t access a site, debug, inspect and maybe even enumerate other protocols
fuzzing is learning too I think I should stick with easy machine only wkwkwk
Just rooted Book, and see a fresh new MrR3boot box! And it’s not even midnight yet.
There are some more ports, but not quite talkative or I’m just using incorrect words to speak with them
Spoiler Removed
Type your comment> @JMFL said:
Spoiler Removed
i had my doubts but the removal of this codified that lol.
i Knew it lol be on in a little
Is es****e a rabbit hole ?