Enumerate. Find things that look odd and request them from the server. Use this to find other pages which might be useful. Visit them, tamper a bit and get access.
When you have access grab the thing you couldn’t access before and look at what it contains. Examine the stuff - get the loot (for later) and find something you can exploit to get a shell. Exploit it, get a shell.
I have analyzed with Burp Suite, I have found strange things, the problem is that I have not found a way …
To crack the password hash and get 2nd user…?
I’ve used the kitty and the other guy and nothing is working. Hash is identified and I’m using the correct formats. Am I missing something?
Enumerate. Find things that look odd and request them from the server. Use this to find other pages which might be useful. Visit them, tamper a bit and get access.
When you have access grab the thing you couldn’t access before and look at what it contains. Examine the stuff - get the loot (for later) and find something you can exploit to get a shell. Exploit it, get a shell.
I have analyzed with Burp Suite, I have found strange things, the problem is that I have not found a way …
Those strange things can still work if you submit them in the orange greatness.
Enumerate. Find things that look odd and request them from the server. Use this to find other pages which might be useful. Visit them, tamper a bit and get access.
When you have access grab the thing you couldn’t access before and look at what it contains. Examine the stuff - get the loot (for later) and find something you can exploit to get a shell. Exploit it, get a shell.
@z3r05i6n41 said: > Alright, so day three and no cracked hash. Can someone please PM me? Check the format and password list. If you have the hash, exactly as it is shown in the output, it should crack with john pretty quickly.
Wow. User was a lot harder than root! Fun box. Can’t really think of anything more than what has already been said that’d be helpful other than once you have the item that everyone has already mentioned, you REALLY need to review what’s contained within or you’ll probably overlook your way onto the system (I definitely did!).
Type your comment> @TazWake said: > @z3r05i6n41 said: > > Alright, so day three and no cracked hash. Can someone please PM me? > > Check the format and password list. If you have the hash, exactly as it is shown in the output, it should crack with john pretty quickly. I’ve copied directly out of terminal. Verified the hash type, as well. I ran a test on my own hashed password from the same location, and it too never cracked in either hashcat or John. Which makes me thing there is an issue with the programs themselves, but both doing at the same time seems highly unlikely. I even tried different dictionary lists to no avail.
@z3r05i6n41 said: > I’ve copied directly out of terminal. Verified the hash type, as well. I ran a test on my own hashed password from the same location, and it too never cracked in either hashcat or John. Which makes me thing there is an issue with the programs themselves, but both doing at the same time seems highly unlikely. I even tried different dictionary lists to no avail. That is a touch odd - it took under 4 minutes with John on my VM: Will run 4 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status 0g 0:00:00:35 6.59% (ETA: 21:45:35) 0g/s 30681p/s 30681c/s 30681C/s 653000..652007 XXXXXXXXXXXXXXXXXXXXX (?) 1g 0:00:04:02 DONE (2021-08-10 21:40) 0.004124g/s 30572p/s 30572c/s 30572C/s If you want to PM me your command line I can check if there is anything odd. (and I’ve no idea why markdown appears to have stopped working)
Type your comment> @TazWake said: > If you want to PM me your command line I can check if there is anything odd. > > (and I’ve no idea why markdown appears to have stopped working) I sent you the commands and their outputs
the hash is taking too long to crack with rockyou. i know i am not doing anything wrong because the hash of my account was cracked successfully. any nudges or a modified passlist perhaps?