Is the challenge broken? I’ve tried for very long without any luck.
Gave up and found both a write-up as well as a youtube video, both of which show functionality within the p********.*** file that i cant be replicated.
and the s***** tool that everyone is talking about is unable to figure out anything using that file, as people are hinting it should be able to in the here in the forum as well as in the video/walkthrough i found.
Is the challenge broken? I’ve tried for very long without any luck.
Gave up and found both a write-up as well as a youtube video, both of which show functionality within the p********.*** file that i cant be replicated.
and the s***** tool that everyone is talking about is unable to figure out anything using that file, as people are hinting it should be able to in the here in the forum as well as in the video/walkthrough i found.
Hello guys,
I’m trying to do the advanced stuff with “The tool” but “The tool”'s telling me that there are “no data retrieved”.
Already google it, but I’m not finding anything useful.
Please, can anyone send me towards the right direction?
I got stuck on this one for longer than I liked. But it was because I didn’t know about some of my options, and I wasn’t paying enough attention. Thanks for the hints in the thread, they helped me get out of my rabbit holes. I think this challenge is pretty tricky because you can get stuck easily. But I learned so it’s good
Hey there! I managed to display some hashed datas but I can’t figure out how to access the login form. The hints say “read the source code” but even after I perfomed directory listing and had a look on each accessible file I can’t find this login form … Any hint on “how to read source code”?
Hey everyone. I am stuck on finding what function to use in the tool, since I am kind of a noob in using it. Could someone DM me for a more in-depth hint?
EDIT: Nevermind, apparently I was very unlucky and tried lots of incorrect values. Finally solved it
i did solve it it takes me 4 h
my hint:
1.read the source code
2.use that tool to steal some data(dont tink abute that hash nothing there well help you, you just want find that vulnerability)
3.brute force directory “dirb” or gobuster
4.what vulnerability you found in step 2 use that but you want more advance coomand