initial ( standard recon, read about the app, )
user ( once in look at everything and use your head)
root ( google and research alot as usually it’s a rare known poc or github…little trick but not bad read the thread above… then it’s simple… there a well known tool you can export infortmation from what you find)
pwd!
The machine is really easy.
Maybe out of a bit of laziness I got mixed up in root. The process is quite mechanical.
If anyone needs a tip, send me a dm!
Good hack for everyone!
ps: Thanks to the guys who gave me a hand
Hi, I’m stuck on getting the file.
I login to and saw the ticket, I don’t know how to get the dump file, I would appreciate it if someone could give a hint
easy until i get the keepass file john does nothing with that file and d…t gives me a broken string that also does not works any hints to read that file?
im here too…i think we we are gonna use the keepass file and the incomplete string from d…t to actually get the full password by using hashcat, but i can ;tphantom how the command line will go, because d…t has the broken strings broken weirdly…sighs
I think that the way that the box is setup is for Non-possible crack the password via brute or hashcat way. So you need to work araund specific tools. Not brute-force ones…