[FORTRESS] Akerva

Finally rooted :slight_smile:
If anyone need a nudge, PM

Rooted my first fortress, rly fun experience! You may always PM for nudges :smile:

Wow - I’m loving this fortress. Upto fuzzing it’s awesome. :wink: Hope to go more. First fortress
@FreeVirus Thanks for remembering that I was using some awkward form of username in the .py script. Lol I was laughed out to burst when I realize what I typed! :open_mouth:

that guy on 10.13.14.13, stop sending ■■■■ to the machine, you are just killing it for everyone. All I could see is constant requests, unless you are DDOS’ing it on purpose ?

still doing it, can’t believe this.

Type your comment> @idevilkz said:

still doing it, can’t believe this.

Probably he is just running a gobuster session, or something similar.
You can just filter out the stderr output when opening a shell, then try to open another reverse shell using nc/socat/…

This should do the trick to get a clean output :wink:

looks like he was. I managed to clear it. got last flag left, will tackle on later.

Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.

Hi everybody!

A nudge on the last flag, please? The crypt is not trivial…

Ah btw, was the 7th flag supposed to be that easy? I found a command that did the magic, was it left behind by someone else?

Thanks!

Type your comment> @cyberafro said:

Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.

I tried three different versions of python and got three different results…one of them worked correctly

I just owned my first fortress! It was a thrilling ride. Getting P** for the con***e took some time quite. But it’s easy when we concentrate on “TAB” name. The final flag part is quite interesting.
My hint for last flag : Analyse the Cipher type and then proceed. When a baby start to learn about Alphabets, he may miss some letters. Hope this one will not be considered as Spoiler. If so, kindly report it.
PM for little bit nuggets. :wink:

Type your comment> @daemonzone said:

Type your comment> @cyberafro said:

Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.

I tried three different versions of python and got three different results…one of them worked correctly
Thanks, @gunroot also pointed me in the right direction,

What a journey it was capturing all flags, rooted the machine…!!

I’m Stuck at OpenBook flag. Can anyone give me a nudge?

EDIT: Done with OpenBook. Thanks @FreeVirus

been trying to get the last two flags for an hour now, in that time it has been reset 2 times. what is wrong with you guys

If any knows how to filter this shell to not show all the requests please DM me

is second flag (look around) about some udp ports ?

Type your comment> @sh4d0wless said:

is second flag (look around) about some udp ports ?

Give a try.

Even I’m also into second flag, enumerating again again but no success.

Could anyone help me?

Type your comment> @bharathacker said:

Even I’m also into second flag, enumerating again again but no success.

Could anyone help me?

The things in this form makes enough hints for the second flag. Run wisely.

Done with the fortress. Had fun going through it. PM for hints.