at first I hated this box thanks to @TazWake pointing me to the right word list found the needed files to move on to the next fight with X** solving this part gives you the possibility to retrieve needed information and file locations which brings y…
> @jasperonio said:
> Am I the only one can't found script to exploit h++p based b+++er o+++f+++ of r+++s ? Damn!
> I figure out the vulnerability is CVE-2019-101++ but now I don't know what can I do, if it's right way... Any hint for me…
is the user.txt in a different place?
I have the user.txt in users\c***** it shows 32 user.txt
when I enter it in the portal it gives an error
Nevermind done it true a different way and now it's accepted
Hi can someone help to get a reverse shell on this box? I have decrypted the A*****.zip file found the vist secret but when I use yso**** I get userSubscribe.faces - No saved view state could be found for the view identifier.
How do I get a reverse…
can someone give me a hint how to get a shell to this box? I have both creds found.
I x********l is enabled under the s*****d user. Even m***** is uploading with some messages in between but ending with no session
What do I not see?