Last Active


  • Rooted. These are my tips: foothold: ALWAYS launch 2 nmap, one for one side and one for the other side. user: pay attention to that fu**ing "ltd" 1->2: use nc and while loops to understand what is happening root: read, read, read, rea…
    in Quick Comment by Gand3lf May 2020
  • I have never seen a machine like this in windows. This machine is ART. Thank you @MinatoTW and @egre55 and congratulations for creating a monster like this. (Image)
  • Rooted. For who tries this machine as "first hard machine": go away, try other machines first. * user: hints in the forum are enough. * pwn: For the binary you have the source code and 2 versions of the binary(yes, 2 versions: one is eas…
    in Patents Comment by Gand3lf April 2020
  • Rooted. The root part is an old but always funny technique (also present in a OSCP lab machine).
    in Magic Comment by Gand3lf April 2020
  • Rooted. Really hard and beautiful machine. A lot of hints are already present in the thread, I add only few things: -Yes, there are badchars but the rest is good -For the last step of root you can do it without the terminal :smile: Thanks to the c…
  • Rooted. Thanks @VbScrub, good box, hope you will release other medium boxes.
    in Cascade Comment by Gand3lf April 2020
  • Rooted. Personally, I think that this box is good to learn some basic concepts, nothing more. User: maybe what seems to be empty is hiding something. Maybe you can go in other places, just try. Root: read the configuration file to bypass the 403 and…
    in ServMon Comment by Gand3lf April 2020
  • I can suggest you "Practical Malware Analysis"(Michael Sikorski, Andrew Honig), this is probably the best book for starting to analyze malware and also binary code. Some important topics in this book are: IDA Pro, OllyDBG, antidebugging te…

Howdy, Stranger!

Click here to create an account.