These are my tips:
foothold: ALWAYS launch 2 nmap, one for one side and one for the other side.
user: pay attention to that fu**ing "ltd"
1->2: use nc and while loops to understand what is happening
root: read, read, read, rea…
For who tries this machine as "first hard machine": go away, try other machines first.
* user: hints in the forum are enough.
* pwn: For the binary you have the source code and 2 versions of the binary(yes, 2 versions: one is eas…
Rooted. Really hard and beautiful machine.
A lot of hints are already present in the thread, I add only few things:
-Yes, there are badchars but the rest is good
-For the last step of root you can do it without the terminal :smile:
Thanks to the c…
Rooted. Personally, I think that this box is good to learn some basic concepts, nothing more.
User: maybe what seems to be empty is hiding something. Maybe you can go in other places, just try.
Root: read the configuration file to bypass the 403 and…
I can suggest you "Practical Malware Analysis"(Michael Sikorski, Andrew Honig), this is probably the best book for starting to analyze malware and also binary code. Some important topics in this book are: IDA Pro, OllyDBG, antidebugging te…