c0uldb3

About

Username
c0uldb3
Joined
Visits
311
Last Active
Roles
Member

Comments

  • Hello guys, could you pls give me a hint regarding user. I found Con*****n.da* file, there was prtgadmin user, however password looks encrypted. Also, I found an exploit which I need to use, but I do not have some data which I need to catch by Burp …
    in Netmon Comment by c0uldb3 April 2019
  • Hello, I have found two credentials, decoded first part of code (..!?!) and stuck on the second (looks like ba4). Used ba4 decoders, however nothing valuable did not find in the output. Only random symbols and two times index.php. Could you pls giv…
    in Frolic Comment by c0uldb3 December 2018
  • (Quote) Hello, Someone has posted a link with different rev shells. Did you try one of them? PM me with your code.
    in Carrier Comment by c0uldb3 December 2018
  • Hello, I have got user and rev shell. Stuck on PE. Know that I need to use B** H*****ing. However, I do not know how to do it. Kindly ask you about a hint.
    in Carrier Comment by c0uldb3 December 2018
  • (Quote) Scan for all tcp\udp ports will help you to find initial foothold.
  • (Quote) I am at the boat. Did you use hyd** for a brute force?
  • Hello guys, I have found both credentials. Now I am stuck on the secong log in page. Cannot find anything from output from sn** enumeration. Could you pls give a hint?
  • Hello guys, I got local user access. It was not so difficult. Now I am stuck on PE. I have discovered "Z*****s application, probably service too. Is it right path? I would appreciate, If you give me a hint.
    in Access Comment by c0uldb3 October 2018
  • Thanks to box designer. So nice box. Learn a lot. Also, would like to thanks @MTOTH and @x00byte for giving hint regarding rev shell.
    in Giddy Comment by c0uldb3 October 2018
  • Guys, could you pls assist me with generating and delivering malicious file to the victim? I have tried different cmdlets and tools, do not work. I know that I need to generate file, then execute that file o the victim and I will receive something t…
    in Giddy Comment by c0uldb3 October 2018
  • @s073r1k. Thanks for you reply. Figured out where I did something wrong.
    in Giddy Comment by c0uldb3 October 2018
  • Hello, I have found some logins and hashed passwords. Can anyone give me a hint how to decrypt them?
    in Giddy Comment by c0uldb3 October 2018
  • Definitely, got the root. Really great box. Spent almost 5 days. 100 % enjoyed the box. I would like to thank @Everlastdg and @Skunkfoot for not providing too much information about the hint. Learned a lot.
    in SecNotes Comment by c0uldb3 October 2018
  • Hello, I have found some ***.exe. Have executed the file and got root. However, still cannot open Administrator directory and cannot find the file with the flag. Search command with "root.txt, administrator.txt"did not bring me positive re…
  • Hello guys, Can anybody give me a hint regarding reverse shell? I found a user. Logged in to the service. However, do not know how to execute shell. Thanks in advance.
  • Hello, Guys could you pls give me a hint. I ran dirb, nikto and gobuster with different wordlists (common.txt, big.txt, something.medium.txt). Have found two directories to which I do not have access "Forbidden". Would appreciate a hint.
    in Bounty Comment by c0uldb3 August 2018
  • Spoiler Removed - Arrexel
    in Aragog Comment by c0uldb3 July 2018
  • Hello guys, could you pls point me in correct direction. I found cookie and wanted to decode it. However, I got an error: ERROR: All of the responses were identical. I know that I have somewhere mistake. Help me pls.
Avatar

Howdy, Stranger!

Click here to create an account.