roelvb

About

Username
roelvb
Joined
Visits
1,092
Last Active
Roles
Member

Comments

  • Type your comment> @TazWake said: (Quote) That other thread is (almost) empty :smiley: so better stay here..
    in Blunder Comment by roelvb May 31
  • Got the Ad****r lo**n but unable to get in with the creds found. Also looked for exploits :s Anyone pls who can PM me if this is the right track or another rabbithole?
    in Admirer Comment by roelvb May 2
  • I have collected some usernames and passwords during enumeration, but not able to use them for foothold!
    in Admirer Comment by roelvb May 2
  • Type your comment> @init5 said: (Quote) Same here! Can't open/find the original filename after upload...
    in Magic Comment by roelvb April 18
  • It is horrible with the performance of this box :smile: I have followed the steps of exploitation but no rev.shell...
    in ServMon Comment by roelvb April 12
  • OMG, already firstblood in a few minutes....my scans are not even finished :)
    in ServMon Comment by roelvb April 11
  • Type your comment> @sm4sh0ps said: (Quote) Thanks, great advise 🙄
    in Cascade Comment by roelvb March 29
  • I have read the massive output of e***4****x several times, line by line, but no password found. Am I looking on the right place?
    in Cascade Comment by roelvb March 29
  • Type your comment> @cyc0rpion said: (Quote) I still have to find out where to put the payload exactly. Do I need to completely replace the predefined payload section?!
    in Remote Comment by roelvb March 22
  • Type your comment> @yannizZz said: (Quote) Yes, me!
    in Remote Comment by roelvb March 22
  • Type your comment> @bekho said: (Quote) Nope! Works just fine!
    in Traceback Comment by roelvb March 15
  • Moved to user S*******n but got stuck overthere for a while...
    in Traceback Comment by roelvb March 15
  • Type your comment> @nando740 said: (Quote) I was on 97% towards pro hacker but I felt back to 82% after Postman was retired :)
    in Sniper Comment by roelvb March 14
  • Spoiler Removed
    in Sauna Comment by roelvb February 16
  • The password should be exposed or captured somewhere, but the question is: where :)
    in Monteverde Comment by roelvb January 12
  • I found the domain, groups and users. I have bruteforced for passwords but just nothing! Anybody who can PM me about the tool I need to use to find a password? I am lost atm...
    in Monteverde Comment by roelvb January 11
  • Type your comment> @Nt3c said: (Quote) I tried top-1000 passwords against all users, but no luck! :(
    in Monteverde Comment by roelvb January 11
  • Got www-shell too but cannot find anything to get user
    in OpenAdmin Comment by roelvb January 4
  • Hi guys, Anyone who can help me how to use B*****S.py ? I have creds but when I run the .py file I get an error about file permissions of e/s***** I read the contents of that .py file but I have not an idea how to get it working! Thanks!
  • Fuzzing the file dir was easy and straightforward. But I have no idea what I can do with the .py. I have saved it on my local machine and run it but get errors. And I have read the contents line by line but I could not determine anything juicy to g…
  • I am struck on the root part. i got a password and successfully logged into the website, but i can't get anything. Anyone who can PM me for a nudge on what to do next for root?
    in Registry Comment by roelvb November 2019
  • Type your comment> @mcruz said: (Quote) Got it, thanks!
    in Registry Comment by roelvb November 2019
  • I got stuck on: /v2/b****-i****/b****/sha256:******* I have downloaded some directories with the blob****. I have checked all of them but did not find anything obvious for further use. Am I missing something there or is it the wrong place to look?
    in Registry Comment by roelvb November 2019
  • Rooted this box!! * Foothold: No hints needed, it's too easy! * User: The first obvious thing you'll find is probably not what you need; Read the contents of the files in the n****** directory and you'll get there... * Root: Find an obvious file fo…
  • Still stucked with the credentials found/cracked. I have viewed all the files contents within the n*****o directory for additional information/hints but I did not find anything suspicious. Anyone who can PM for a nudge into the right direction? Thn…
  • I got in and have credentials, but cannot use it until now..
  • Me too!
  • DOS' ing this box should be punished with a ban for tonight :) Keep your scans quiet please
  • Annoying that closed port 80 issue :s
  • Got root! * Initial foothold was for me the most educational part of the box. * User was pretty easy (enumeration is key...) * Root was the easiest part (did not learn something new here)
    in Postman Comment by roelvb November 2019
Avatar

Howdy, Stranger!

Click here to create an account.