Gand3lf

<>

About

Username
Gand3lf
Joined
Visits
406
Last Active
Roles
Member

Comments

  • Rooted. These are my tips: foothold: ALWAYS launch 2 nmap, one for one side and one for the other side. user: pay attention to that fu**ing "ltd" 1->2: use nc and while loops to understand what is happening root: read, read, read, rea…
    in Quick Comment by Gand3lf May 3
  • I have never seen a machine like this in windows. This machine is ART. Thank you @MinatoTW and @egre55 and congratulations for creating a monster like this. (Image)
    in Multimaster Comment by Gand3lf April 29
  • Rooted. For who tries this machine as "first hard machine": go away, try other machines first. * user: hints in the forum are enough. * pwn: For the binary you have the source code and 2 versions of the binary(yes, 2 versions: one is eas…
    in Patents Comment by Gand3lf April 27
  • Rooted. The root part is an old but always funny technique (also present in a OSCP lab machine).
    in Magic Comment by Gand3lf April 21
  • Rooted. Really hard and beautiful machine. A lot of hints are already present in the thread, I add only few things: -Yes, there are badchars but the rest is good -For the last step of root you can do it without the terminal :smile: Thanks to the c…
    in ForwardSlash Comment by Gand3lf April 18
  • Rooted. Thanks @VbScrub, good box, hope you will release other medium boxes.
    in Cascade Comment by Gand3lf April 15
  • Rooted. Personally, I think that this box is good to learn some basic concepts, nothing more. User: maybe what seems to be empty is hiding something. Maybe you can go in other places, just try. Root: read the configuration file to bypass the 403 and…
    in ServMon Comment by Gand3lf April 13
  • I can suggest you "Practical Malware Analysis"(Michael Sikorski, Andrew Honig), this is probably the best book for starting to analyze malware and also binary code. Some important topics in this book are: IDA Pro, OllyDBG, antidebugging te…
Avatar

Howdy, Stranger!

Click here to create an account.