Last Active


  • @monstr @elearning Thanks again for your help in pointing the correct direction.
  • Hi Need some nudge in the right direction on unzipping the file to get the flag.txt file. Have been looking at twitter for hours but wonder what i missed out. Thanks in advance :)
  • Hi guys i trying to follow the steps in Ippsec video but kind of stuck on the step where pwntools call gdb.debug(). Somehow it did not break at main show the gef window as shown in ippsec video Try to google the issue online but no luck. I guess i …
    in Safe Comment by SleepyKaze November 6
  • Type your comment> @Digsy said: (Quote) Check if there is any new folders you can read as k****a user and view the processes run by root. See if you can link any of them together and try to root from there
    in Haystack Comment by SleepyKaze July 10
  • Type your comment> @odinshell said: (Quote) Thanks for the hint. finally knew how to escalate to k***a onto the last step of root
    in Haystack Comment by SleepyKaze July 10
  • Hi. Can anyone provide me some hints on how to escalate s******y user to k****a user? Really appreciate
    in Haystack Comment by SleepyKaze July 8
  • rooted. Thanks t4l0 for the hint
    in Jarvis Comment by SleepyKaze July 2
  • Hi guys, need some help in this. I have found the .k**** file and able to extract some passwords from this file. However i don't know what can all these passwords do to help me in my priv escalation?
    in AX Jeeves Comment by SleepyKaze May 2018

Howdy, Stranger!

Click here to create an account.