Kali has gotten very bloated. That's why in their latest release they also did a cleanup of the packages included.
ParrotOS is nice because you can easily install a package-group specific for pentesting, web, forensics, mobile, ..…
Since I have no experience reversing EXE's, I was wondering whether you give me an additional hint on this.
Do I need to decompile the EXE to try a similar tactic as earlier, or am I supposed to enum further first?
Type your comment> @roowashere said:
It's not because you can, that you really need to.
Sometimes people get stuck looking for a way to get a revshell, while everything they need is right in from of them
* Found out how to view the response
* Found a method to do some conversions and decoded it
* Got the result
* I'm sending the result back
* Now I just getting a bunch of numbers (recv()) or nothing at all (recvall())?!
Output of my script (red…
So I'm working on #8, skipping #6 and #7 for the moment.
For this, I found that the publicly accessible port gives me some information, but I can't seem to find a method to extract the exact info I need.
I thought it might be useful to connect to a…
Am I correct that you need to do Overflown before you can do Secret Message?
I'm able to find the points of entry for 6, 8 (kinda), 9, 10, 11 but can't find where to start 7.
I'm pretty sure I know what type of attack I need to do to beat Overflown…
Type your comment> @idevilkz said:
Check the levels and start with the first one.
You'll need to do at least 1-5 in order before you can do 6+.
As with most CTFs, the name of the challenge might give you a hint at where to look.
Type your comment> @AnonRyuk said:
I found that one, which lead to me where I found Flag 4, however still having issues finding Flag 3. Any nudges, PM maybe?
EDIT: nvm, didn't follow the source
Type your comment> @FlatMarsSociet said:
Seems to work once you reach "hacker" status.
(or someone worked on a fixed)
However, the static badge still won't load on my website: https://sequr.be/about/
Nice box @Xh4H!
foothold: the info you need is there, don't be afraid to Google something
user: > @alalno said:
As others have said, you don't need to upload anything.
Someone may have already left something behind?
So I used IBM Watson and Mozilla DeepSpeech but in the end decided to just do it by ear (VLC and sloooow playback).
Got the numbers
Tested a script at https://ide.geeksforgeeks.org/
Got 2 resulting numbers
I feel like an idiot for having to ask this
I found the high port and connected to it using an plain-text protocol like netcat but more Windows like (works from a Linux box).
I found that you can run certain commands and that you're not restricted …
Type your comment> @Crafty said:
Thanks for this one!
Finding the best method to retrieve the password was the hardest part.
Tried to Google OCR solutions, but this was taking me way to far. Decided to go back to the basics and think ab…