Official Pilgrimage Discussion

dm me

What is the output of this command?

df

There’s no space between the db text and the creds. Make sure you read it properly.

1 Like

Was able to dump all the data from the exposed .***/ repo but I am not sure exactly what to do next to get a foothold for user. If someone could message me thatd be very nice :slight_smile:

Look in your loot, what is happening on the server?

how to write the malwares

Nice box!

Some tips

User: Just enumerate, use and read everything you found.

Root: Very straightforward, but be careful! where you are is very important for the exploit.

feel free to dm me

i have found the .*** directory and the files and i still can’t figure out how to exploit the webpage. Please pm me with any kind of help

can I pm you? i am having some problems with exploiting the webpage

1 Like

Sure!

currently fighting to make the i********k exploit work

Same. The command the POC uses is not supported on the system. I’ve changed the command and everything looks fine but it does not seem to execute. Let me know if you find anything

I don’t even know if I’m doing it correctly, every explanation of the exploit i’ve found is very unclear on how to perform it

dumper.sh 加url

found the username e**** (I saw some people talk about it) but i still dont know how to get access to the creds

1 Like

Pay attention to source code, there is the answer. Hint: use the same exploit

but i already have the source from the .*** repository

Well, read the source code and check how is the auth process

I am getting errors when decoding it

how to find the username? can you tell me