Kedaegan

About

Username
Kedaegan
Joined
Visits
362
Last Active
Roles
Member

Comments

  • Type your comment> @civility0 said: (Quote) Maybe there is a way to run a python script without python being installed.
  • bankrobber might help
  • I don't normally comment on boxes. This one actually represented the difficulty level in my opinion. As far as how real it is very real if your doing a pentest. Dumping GC and grepping for keywords is very common way of finding interesting things ev…
    in Cascade Comment by Kedaegan March 2020
  • It's always been a local exploit
  • I'm having a rough time putting all the pieces together to gain initial foothold. Found vulnerabilities in a few different places where I can read files. Found another that lets me "execute" files when something happens. Not sure how to go…
  • nmap -p- 10.10.10.178
    in Nest Comment by Kedaegan January 2020
  • Type your comment> @aiak0s said: > Type your comment> @kan3k1 said: > > (Quote) > And from windows the same message... Thinking like a pentester I ask myself whether I care if the program actually works or not. Why am I eve…
    in Nest Comment by Kedaegan January 2020
  • I got the same error and would like to know as well.
    in Nest Comment by Kedaegan January 2020
  • Type your comment> @VbScrub said: (Quote) I was in the same boat but between the batman video from ippsec and https://stackoverflow.com/questions/19631739/powershell-remoting-from-a-windows-service I was able to get shell from the non-user user…
    in Sniper Comment by Kedaegan January 2020
  • Rabbit hole?
  • Type your comment> @cmoon said: (Quote) If you look closely it is lowercase. Not uppercase.
    in Haystack Comment by Kedaegan July 2019
  • Best nmap can do is guess. The way it guesses is by the reply of the open ports and such. If there are not many open ports to none it wont tell you anything as far as os goes. You can try nmap -sT -O IPADDR Sometime the only clue you will have…
  • Type your comment> @scottmorrison said: (Quote) Break it to see how it works... research.
  • > @Tugzen said: > I stuck on user part..I am looking for th db via http://10.10.10.115/b**/_al/_search but I can't see anything important..How should I take user,with reverse txt or will get credentials from db from web search?Any nudge pleas…
    in Haystack Comment by Kedaegan July 2019
  • The syntax is in the f****r.c**f file. Googlefu a debugging tool and play with the syntax.
    in Haystack Comment by Kedaegan July 2019
  • Type your comment> @kckriega said: > Type your comment> @v1p3r0u5 said: > > Type your comment> @kckriega said: > > I'm stuck here as well :( Looks like a BoF, but where to get the bin??? > …
    in Safe Comment by Kedaegan July 2019
  • Type your comment> @x4t4n4x said: > I can't escalate, because l*****h_* files that I created are deleted several times. L*******h has a tendency to delete stuff if it doesnt match it's filter.
    in Haystack Comment by Kedaegan July 2019
  • Normally Ill redo a machine so i can grab snapshots of what I did. If your trying to understand what you did and why it work is also a good reason. If your just there for the flags then there is no reason to redo it
  • Type your comment> @nemen said: > Hi user.txt taken. I went up as a user k ******. now I don't know how to go on. any small suggestions? Enumerate what you have. Reaearch what that user is for and the software as a whole. Then when you …
    in Haystack Comment by Kedaegan July 2019
  • Anyone throw a nudge on command. It looks like 1 of three thing but I am not really seeing what needs to be done.
  • Type your comment> @vGsec said: > @fasetto said: > @Xtrato Use quotes. curl 'url-here' > > > > > > I managed to get a shell once but right now the same command is doing nothing. Try renaming it. Thing…
    in Haystack Comment by Kedaegan July 2019
  • After getting a terminal: python -c 'import pty; pty.spawn("/bin/bash")' CTRL-z bg stty raw -echo fg reset (In case of unknown terminal type try: linux) Optional: export SHELL=/bin/bash export TERM=xterm-color export HOME= Then fix up t…
  • Whats the difference between 6 and room 1.... are they truly = to each other.
    in Jarvis Comment by Kedaegan July 2019
  • Type your comment> @Tugzen said: > Hi Guys,I could get the user.txt > But ı couldn't crack the S*M file with john .I just could able to do it online via hashkiller.If someone can crack via John,please send me a PM.I really wonder what i…
    in Bastion Comment by Kedaegan July 2019
  • Read up on how l******h handles log files.
    in Haystack Comment by Kedaegan July 2019
  • Page 5 has your hint
    in Luke Comment by Kedaegan July 2019
  • Grok is your friend
    in Haystack Comment by Kedaegan July 2019
  • Anyone mind nudge me on how to make l******h do it's thing?
    in Haystack Comment by Kedaegan July 2019
  • Depends on how you learn. IppSec has a bunch of videos on youtube. If you have a VIP then work on the archived boxs and watch the videos. Best way to learn in my opinion is just doing it. https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
    in Privsec Comment by Kedaegan July 2019
Avatar

Howdy, Stranger!

Click here to create an account.