Dame, I’m not getting Shell the .odt file-payload doesn’t work, I did manually…
Reference:
Help me dm pls
Dame, I’m not getting Shell the .odt file-payload doesn’t work, I did manually…
Reference:
Help me dm pls
What an awesome ride with this machine, so many things I was not even aware of before this.
Thanks a lot to @JimShoes for hints!
Did you set your macro to run at document open?
Glad to help.
Yes I did it
but doesn’t work, maybe I should use msf but I don’t want, I like manually… because i’m practicing for OSCP
Just create it manually and add the macro for shell, try different ones if it doesn’t work and customize it to run at open.
hi i need help ?
with go***r part i found the proxy but i dont know how to connect
I have root. Out of quriosity, @Que20 what is the point of tcpdump and pgp in one of the user accounts?
any hint in root step?
Rabbit holes most likely
and then bash it
Can I DM someone about macro?
sure
Wow, I really enjoyed this machine!
guys so sorry for the big spoiler above i thought i was in private
Hello,
I don’t like to ask for help, but I’m really stuck with the “authentication”, any help to open my mind would be appreciated. If someone can MP me
I have been contacted
really enjoyable box @Que20, thanks a mill for the effort you put into it
Rooted! That’s a really challenging machine.
Some hints:
User: If you in trouble of what to send, have a shuffle of encoding… Search about what you sending. And for what it be clicked, i recommend to make it with your way, some exploits will fail in most of cases.
Root: A simple scan can find what you want to work on it. A simple pwn can satisfy your flag, may is more easily than the previous journey.
PS: If you want some hints or chat about chall, just dm me.