Official Trickster Discussion

You might have missed something during your enumeration.

Summary

You may have something only locally accessible

fscan should get you there; you tried all interfaces, but what about its neighbors?

got it, finally got the user flag.
what is the next hint, please?

if you found the hash(s) for j"“” , then you should rockyou

how did you find the c******** ?

I did the ch******* exploit manually, and I can execute commands, but I cannot obtain a shell. I tried different payloads, Do you have any hints?

bro how u found that web

check network interfaces when you get the first shell as J. Then use your favorite scanning tool

hello i’m root but I can’t find the flag… ???

did u find now

No…

need help ?

1 Like

I thought it was a bug. I visited datastore, tried to decrypt secret.txt, tried to recover the .zip files but it seemed empty … Yes if there is a solution I would like help

bro there in backups there are zip files check thme

Hey all,

I found the exploit and made the changes but still not getting the reverse shell, Please help!

where are u stuck

I got the exploit made changes to the code that will trigger the alert but still not getting the shell

are u at initial foothold?

gin bro

i just start machine and found mail of admin and hash but hash not cracked am i on right path or am i in rabbit hole ?