Drx51

# WHOIAM *I'm pentester and engineer security. Love hacking and reading books about pentesting and so one.* I like - Video games ( I play on XBOX). - Reading - Writing some articles - Cycling I've discover HTB by a friend who don't work in security. It's very a huge CTF and very nice people on the forum

About

Username
Drx51
Joined
Visits
33
Last Active
Roles
Member

Comments

  • It's Ok by now, I made a mistake !! Anyway, thanks for your review of my Walkthrough. I will continue without MSF as much as possible ! I give you one respect point on your profile. Nice to know you Good afternoon
  • I've tried but nothing happens ! sniff I see nope when I write a message
  • Hi dude, Thanks for your message, very nice. Yep I know for what you said. I use it less and less. It was my first machine on HTB Thanks a lot, Regards PS : How did you do to include your profil in your signature ?
  • Ok, I understood. Thanks and sorry for the disturbing
    in Dashboard Comment by Drx51 April 2018
  • Yes I know !! I did it yesterday before the retirement of the machine
    in Dashboard Comment by Drx51 April 2018
  • OK, but when I owned the machine, the machine didn't retired yet !
    in Dashboard Comment by Drx51 April 2018
  • It's Ok for me. I've owned it ( user and root). Nice box wish can get you get crazy if you follow the white rabbit ( like I followed). That I could say, enumeration and search for how to connect to the admin panel ( a specific stuff) , then, exploit…
    in Sense Comment by Drx51 March 2018
  • My enumeration is fine but I might think that it's embarrassing because when I bruteforce the URL, I've got only error 403 and 301. Does it normal ? that's why I'm stuck Just a file which is logs but nope interesting ! . Thanks
    in Sense Comment by Drx51 March 2018
  • I've not been blocked because I guessed the password and login. Try the login/pwd very usual what you could found in a WAF webpage admin and so on. It's hard not to give you the solution
    in NIbbles Comment by Drx51 February 2018
  • It's OK, I've rooted the server yesterday thanks
    in NIbbles Comment by Drx51 February 2018
  • It's Ok, I've rooted yesterday
  • I'm full stuck on the machine NIbbles to get the root flag ! Any idea ?
  • YEP I keep doing hack
  • Ah. 'cause I owned both ( user and system) and points are gone. I've got flags before the machine retired
  • Is there a protection of PHP ? 'cause my php files I want to upload, doesn't work.. any idea ?
    in NIbbles Comment by Drx51 February 2018
  • Stuck with backdoor in PHP. The website doesn't want it and I don't understand.
    in NIbbles Comment by Drx51 February 2018
  • Good Evening, I can not bruteforce a specific directory, it doesn't work. I mean, dirb results me Calculating NOT_FOUND code.... I've some problem to interact with the IP. I almost ping. I don't know why. Some have an idea ? Protection against …
    in NIbbles Comment by Drx51 February 2018
  • Hi I've found where I shall put hashes of users and root. Not very useful because I don't know very well the website bye
    in Shocker? Comment by Drx51 February 2018
  • Hello again I've finally hacked the machine. I've got the flag ( root .txt) with the value. I see my dashboard and no points. How can I do to have the points ? Very sorry for the idiot question..... Thank you Have a nice evening
    in Shocker? Comment by Drx51 February 2018
  • Re ! Sorry, my msf hadn't got the X64 payloads, so it might work by now. So, for the point, the system of the point, is when I exploit the machine ? Thanks a lot and sorry for my last question
    in Shocker? Comment by Drx51 February 2018
  • Hi everyone, I've got a pb. I've exploit the machine but when I would like to get shell, it doesn't work. I see that the server is a X64, and my payload of metasploit a X86, that can't work. Any idea to pass on shell ? I tried a nc but doesn't w…
    in Shocker? Comment by Drx51 February 2018
  • Yes I know it. It's my bad. Thanks mates
  • Hi brax, I've found it. It's very damn ! sudo Sorry for the disturb
  • Thanks brax My path is on : /usr/share/openvpn then I've only got this file : ls verify-cn This what you mean ?
Avatar

Howdy, Stranger!

Click here to create an account.