Hi, I’m in the same situation, actually.
The only one I’ve not tried is the p** one, maybe that’s the problem?
Or am I missing some steps?
same, maybe I’m using them wrong, any hint?
Just the same as multiple people here, I’ve use the L** to get ****.ini file and cracked the hashes. Used it to login to I but not seeing any messages. Given it a few minutes like some previous comments say and I’ve got nothing. Anyone able to give a nudge. Ive seen some saying to lookup CVE for the service trying to exploit but idk if im trying to exploit IMAP, SMTP, SMB or something else.
Dm me
Locked on privesc . Someone can help ? After checking Scheduled task , unquoted paths, dont knwo what can i do , thanks
I’m struggling with N*** , any hint for url ? I’m guessing is about number of \
but I’ve tried so many combinations
If anyone is stuck for long i can help you with the walkthrough, if required
I know there able to exploit L** with d*****.php to reveal the information, but is there any way to list the current path, and list what file have current path?
i just need a basic hint. I have gone thru the instructions document but using that over my mail client doesn’t yield anything.
Once you sent an email, wait a bit.
Once I use L** and get the ****.ini , crack the Hash, what is my next step?
I’m confusing right now.
This one can found on the Nmap result ?
good learning experience.
I haven’t looked at this in a bit but I believe the main webpage calls out what mailing server is being used. So then the question would be were there any CVEs for that software.
Having issues with connecting via mail… unsure why, reading the directions and everything… even tried telnet login…
Hey I did use LFI and then i got stuck…
Hello,
I am not able to captures H***** using R*** tool. All my commands and everything are correct. Is there anything that I can go?
right, I got whats needed to gain foothold, and i stumbled across the CVE used for this box. but its frustrating me because i dont know how the people talking about that CVE got it in the first place. can someone DM me and expalin how they found out what CVE to use please?
thanks
Yanited ! Yanited ! Yanited !
Hi I was able to get the user hash but I don’t understand why the script exploit worked since the exploit involves the user clicking on a link. If anyone has an understanding please dm