Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.
i am also getting incorrect pin everytime , even after verifying those bits, should we get it reset and try again
I’m also not getting the correct pin aswell. I’ve modified both variables required to run the exploit correctly, but I get an incorrect pin error message
I’ve also voted for a reset. Also the b*** up time is completely delayed. It’s supposed to run every 17min, but I couldn’t find anything near that. I had to extend my script to go over an hour’s worth of time before I finally got the correct b*** up. I doubt it could have been a timezone issue as the b*** up I got was 57minutes old supposedly, not over an hour.
Could someone that got the 5th flag replicate, I’m struggling to get the P** code accepted. Private and public bits already modified.
i am also getting incorrect pin everytime , even after verifying those bits, should we get it reset and try again
I’m also not getting the correct pin aswell. I’ve modified both variables required to run the exploit correctly, but I get an incorrect pin error message
Can someone help me? I am trying to fuzz the /b******/ directory based off of script from flag3 but no luck. Is there a specific word list I should use?
Was my first fortress. It was a nice ride and not too hard.
Most of the questions could be answered with the first 3 pages of this forum, particularly the last flag !!! Flags 5 and 6 aren’t hard but can be easily overlooked. Take time to understand the files you found.
phew!! finally done. This was my first fortress and I had stopped on HackTheBox for quite a while still it was between medium-hard. Last decryption was fun!!