@rholas said:
Script not working on Kali 2020.3 python 2.7.18AttributeError: āintā object has no attribute āvalueā
There is another option?
had the same problemā¦ try updating your repoās
@rholas said:
Script not working on Kali 2020.3 python 2.7.18AttributeError: āintā object has no attribute āvalueā
There is another option?
had the same problemā¦ try updating your repoās
i have command execution but cant get a rev shellā¦ can anyone help plzz
Tip: if you get the message āThe system cannot execute the specified program.ā each time you try to get a rev shellā¦ you have to take the right version of nc64.exe (and think to try all the options of the script found). I lost a lot of time because of thisā¦
PM me if you need a link.
@agpriyansh Iām in the same spot rn.
@choupit0 I guess I need a version of nc that is built for that specific OS and architecture?
Hmm, could use a nudgeā¦ have hashes of the systemā¦ unblocked all ports to my ip. have access into the system from smb as whoever I want.
Not sure how or what to do with the decryption part. EFS?
A little help would be welcomed
Type your comment> @PrivacyMonk3y said:
Not sure how or what to do with the decryption part. EFS?
A little help would be welcomed
Just view the encrypted Flag. There is a mention about something. Google that thing and you will land on docs.microsoft article. It will help you
A weird boxā¦ I tried using an exploit which requires an open port 135(failed), bruteforcing the authorization(failed) and connecting to the SMB anonymously(failed). I read about the R****e20 vulnerability, but as far as I look, thereās no code for it. Any nudges would be welcome.
Am i right in thinking the script is used to upload a shell? The documentation is limited and the command doesnāt seem to work when uploading.
Type your comment> @MilesIwakura said:
A weird boxā¦ I tried using an exploit which requires an open port 135(failed), bruteforcing the authorization(failed) and connecting to the SMB anonymously(failed). I read about the R****e20 vulnerability, but as far as I look, thereās no code for it. Any nudges would be welcome.
you wonāt get in directly through a port, you need to figure out what the machine is and what exploit you can use.
So I think Iāve found the relevant exploit, but when I run it at the moment Iām getting that itās timed out. Is it likely someone has broken the box and I need to reset? I donāt want to just go round resetting all the time.
Another interesting VM from @egre55 Thanks for your imagination and work
Finally ā¦ user and root !! simple but tricky
@gs4l said:
Rooted!! By the way, how did everyone came to the conclusion to use the S******T script here? Someone gave me a hint to use that script.
I found the foothold tough as I was unaware about the script and was not able to get much info from the box initially. After that, it is easy.
Finding the exploit wasnāt too bad. Some of the information from the initial enumeration of the box, and entered into google, gave me what I needed.
Is āNT_STATUS_IO_TIMEOUTā part of the box or is my network messed up?
Edit: Yes.
PM for help
Stuck at foothold the hole dayā¦ I found only the Ac**n Device. There is a ascript but i think it is the wrong one. Is that the right path? pn please
Type your comment> @Timdb said:
Stuck at foothold the hole dayā¦ I found only the Ac**n Device. There is a ascript but i think it is the wrong one. Is that the right path? pn please
If itās the perl script then itās the wrong script. You have part of the answer but there is more clues in this forum. PM if you need a nudge.
Rooted, had problems with getting a reverse shell, same command same syntax did work at a later moment? Weird.
Type your comment> @Arty0m said:
Am i right in thinking the script is used to upload a shell? The documentation is limited and the command doesnāt seem to work when uploading.
iām trying the same thing but canāt understand how to upload it
I think that is not an easy machineā¦
If anyone need help, PM and show me what you got so far.