Official Pilgrimage Discussion

dm me

What is the output of this command?

df

Thereā€™s no space between the db text and the creds. Make sure you read it properly.

1 Like

Was able to dump all the data from the exposed .***/ repo but I am not sure exactly what to do next to get a foothold for user. If someone could message me thatd be very nice :slight_smile:

Look in your loot, what is happening on the server?

how to write the malwares

Nice box!

Some tips

User: Just enumerate, use and read everything you found.

Root: Very straightforward, but be careful! where you are is very important for the exploit.

feel free to dm me

i have found the .*** directory and the files and i still canā€™t figure out how to exploit the webpage. Please pm me with any kind of help

can I pm you? i am having some problems with exploiting the webpage

1 Like

Sure!

currently fighting to make the i********k exploit work

Same. The command the POC uses is not supported on the system. Iā€™ve changed the command and everything looks fine but it does not seem to execute. Let me know if you find anything

I donā€™t even know if Iā€™m doing it correctly, every explanation of the exploit iā€™ve found is very unclear on how to perform it

dumper.sh 加url

found the username e**** (I saw some people talk about it) but i still dont know how to get access to the creds

1 Like

Pay attention to source code, there is the answer. Hint: use the same exploit

but i already have the source from the .*** repository

Well, read the source code and check how is the auth process

I am getting errors when decoding it

how to find the username? can you tell me