dm me
What is the output of this command?
df
Thereās no space between the db text and the creds. Make sure you read it properly.
Was able to dump all the data from the exposed .***/ repo but I am not sure exactly what to do next to get a foothold for user. If someone could message me thatd be very nice
Look in your loot, what is happening on the server?
how to write the malwares
Nice box!
Some tips
User: Just enumerate, use and read everything you found.
Root: Very straightforward, but be careful! where you are is very important for the exploit.
feel free to dm me
i have found the .*** directory and the files and i still canāt figure out how to exploit the webpage. Please pm me with any kind of help
can I pm you? i am having some problems with exploiting the webpage
Sure!
currently fighting to make the i********k exploit work
Same. The command the POC uses is not supported on the system. Iāve changed the command and everything looks fine but it does not seem to execute. Let me know if you find anything
I donāt even know if Iām doing it correctly, every explanation of the exploit iāve found is very unclear on how to perform it
dumper.sh å url
found the username e**** (I saw some people talk about it) but i still dont know how to get access to the creds
Pay attention to source code, there is the answer. Hint: use the same exploit
but i already have the source from the .*** repository
Well, read the source code and check how is the auth process
I am getting errors when decoding it
how to find the username? can you tell me