Z0d

About

Username
Z0d
Joined
Visits
243
Last Active
Roles
Member

Comments

  • Now i got this error "List(key) returned error, retrying after 27.770234378s: Decode: invalid character" when i try to backup any help?
    in Registry Comment by Z0d October 2019
  • Type your comment> @idomino said: (Quote) Same!! stuck for two days now i know everything i have to do and have everything but still nothing i gave up on rshell for root just trying to read the key via wshell
    in Registry Comment by Z0d October 2019
  • I'm on the final point any hint on how to get rshell as user wd tried bind and reverse for million types with no luck managed to get command execution though.
    in Registry Comment by Z0d October 2019
  • The funny thing i can "id" and "whoami" as root and some other capabilities as well but not an actual root on the whole system!!
    in Registry Comment by Z0d October 2019
  • Could someone give me a nudge on root, the possible paths not working for me.
    in Registry Comment by Z0d October 2019
  • Any hint on user where should i look next, got a file lat*** with hashes and got the _c***** name ... don't know how to proceed from there!
    in Registry Comment by Z0d October 2019
  • Type your comment> @Z0d said: (Quote) got it thanks @fex0r for the hint
    in Chainsaw Comment by Z0d October 2019
  • I need a nudge on user B** part if $6$ hash is not the way, so how i could get the secret?
    in Chainsaw Comment by Z0d October 2019
  • Type your comment> @MrB33n said: (Quote) Maybe something wrong with your syntax for me it worked like this set("domain").send({from:"address"})
    in Chainsaw Comment by Z0d October 2019
  • Type your comment> @MrB33n said: (Quote) No because you only list the addresses .
    in Chainsaw Comment by Z0d October 2019
  • The $6$ hash couldn't crack it, any hint or how to use c****-in** to obtain some secrets.... thanks or the $6$ hash is all i need!
    in Chainsaw Comment by Z0d October 2019
  • Type your comment> @MrB33n said: (Quote) There is a command in w3.** could extract accounts could be used to set something small them something larger to get shell . I didn't create any account only the ones already there.
    in Chainsaw Comment by Z0d October 2019
  • Could any one give me a hint on b** user i got shell as a** user found something $6$ but not worked for me, PM please.
    in Chainsaw Comment by Z0d October 2019
  • I'm sure i have the correct hash for user *ob** but couldn't crack it. Any help would be appreciated thanks.
    in Chainsaw Comment by Z0d October 2019
  • Type your comment> @artikrh said: (Quote) The hash from that outerspace service right? which executed and found in some l**s .
    in Chainsaw Comment by Z0d October 2019
  • Type your comment> @zard said: (Quote) I did the rock with two different tools and got nothing , maybe I'm missing something
    in Chainsaw Comment by Z0d October 2019
  • I'm not able to crack user hash? any hint will be helpful thanks.
    in Chainsaw Comment by Z0d October 2019
  • johny johny yes papa cracking hashes no papa telling lies no papa open your terminal Ah, ah, ah! For how long we should wait for user!?
    in Chainsaw Comment by Z0d October 2019
  • (Quote) Who said it is one line of command? maybe each picture needs to be run separately!
    in Safe Comment by Z0d October 2019
  • Type your comment> @garnettk said: (Quote) Each picture when extract with KP gave you a different hash.
    in Safe Comment by Z0d October 2019
  • Type your comment> @Z0d said: (Quote) Got it!
    in Safe Comment by Z0d October 2019
  • Type your comment> @azeroth said: (Quote) When you extract the hash don't forget the 6 files you have to add them, then the master key will be obtained quickly.
    in Safe Comment by Z0d October 2019
  • For how long we should try to crack the hash of KP !! Running for ages with no luck, any suggestion. I'm thinking of try to elevate to root using different approach if possible.
    in Safe Comment by Z0d October 2019
  • Type your comment> @alalno said: (Quote) you are on 127.0.0.1 you want to access a routable IP your IP then what you need ... see my previous comment in Uppercase :)
    in Haystack Comment by Z0d October 2019
  • Free Hints: User: remember spanish is always the key for this and the security is low. Horizontal PE: Banana user has famous lfi exploit, but the trick is running locally only, YOU NEED LOCAL PORT FORWARDING . Root: Spanish again but not Literall…
    in Haystack Comment by Z0d October 2019
Avatar

Howdy, Stranger!

Click here to create an account.