[FORTRESS] Akerva

Type your comment> @sh4d0wless said:

is second flag (look around) about some udp ports ?

Give a try.

Even I’m also into second flag, enumerating again again but no success.

Could anyone help me?

Type your comment> @bharathacker said:

Even I’m also into second flag, enumerating again again but no success.

Could anyone help me?

The things in this form makes enough hints for the second flag. Run wisely.

Done with the fortress. Had fun going through it. PM for hints.

I’m just getting the 5th flag, be careful with the path in the the Py*** script to the ‘app’… Py*** version is important yes, but extension too!! There are different file types

Thanks @nav1n for your help!

thanks a lot @choupit0 for this advice

Finding the last flag is hard ? please, someone can help me? I think I found the right ciph** type and the right length of the key (10) but not sure how to decode it… I tried different sites without success.

Update: I have the right length and the right ciph** now but I’m not sure about the alphabetical letters to use…

Update2: Got it!! And I found it!! :slight_smile: hint: search “Letters frequency Analysis Tool”, it could help you (a lot!) and playing with frequencies

Completed this fortress. Personally i think some challenges are somehow similar to the boxes I did. Good to re-visit my old notes again. I’m available for nudges, if you need. :slight_smile:

Type your comment> @cyberafro said:

Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.

Same situation here, keep getting wrong pin and I’m sure I’ve modified everything that needs to be changed. a pm would be much appreciated

Type your comment> @Phase0 said:

Type your comment> @cyberafro said:

Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.

Same situation here, keep getting wrong pin and I’m sure I’ve modified everything that needs to be changed. a pm would be much appreciated

Get the parameters again and re-exploit.

Type your comment> @Karthik0x00 said:

Type your comment> @Phase0 said:

Type your comment> @cyberafro said:

Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.

Same situation here, keep getting wrong pin and I’m sure I’ve modified everything that needs to be changed. a pm would be much appreciated

Get the parameters again and re-exploit.

mind if I PM you to verify the params? Tried getting them again but no luck

Type your comment> @Phase0 said:

Type your comment> @Karthik0x00 said:

Type your comment> @Phase0 said:

Type your comment> @cyberafro said:

Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.

Same situation here, keep getting wrong pin and I’m sure I’ve modified everything that needs to be changed. a pm would be much appreciated

Get the parameters again and re-exploit.

mind if I PM you to verify the params? Tried getting them again but no luck

am pretty sure the prams fine but still doesnt work ,everything is in front why it doesnt work?

Type your comment> @Phase0 said:

Type your comment> @Karthik0x00 said:

(Quote)
mind if I PM you to verify the params? Tried getting them again but no luck

Pm me.

Type your comment> @Karthik0x00 said:

Type your comment> @Phase0 said:

Type your comment> @Karthik0x00 said:

(Quote)
mind if I PM you to verify the params? Tried getting them again but no luck

Pm me.

fuzz it with known python extensions

Stuck at “Dead Poets” does it something to do with Wrk**g.

Type your comment> @MrJcK said:

Stuck at “Dead Poets” does it something to do with Wrk**g.

No .

@MrJcK said:

Stuck at “Dead Poets” does it something to do with Wrk**g.

Look at your notes, what did u saw when finding “Take a Look Around” ?
The output may help you to understand what you need to hit.

always getting incorrect pin , need some help please.
Verified my M** A****** and Ma*****-*d and ran the script correctly still not able to acces

Type your comment> @cyberafro said:

Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.

i am also getting incorrect pin everytime , even after verifying those bits, should we get it reset and try again

Type your comment> @niting3c said:

Type your comment> @cyberafro said:

Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.

i am also getting incorrect pin everytime , even after verifying those bits, should we get it reset and try again

I’m also not getting the correct pin aswell. I’ve modified both variables required to run the exploit correctly, but I get an incorrect pin error message