You might have missed something during your enumeration.
Summary
You may have something only locally accessible
You might have missed something during your enumeration.
You may have something only locally accessible
fscan should get you there; you tried all interfaces, but what about its neighbors?
got it, finally got the user flag.
what is the next hint, please?
if you found the hash(s) for j"“” , then you should rockyou
how did you find the c******** ?
I did the ch******* exploit manually, and I can execute commands, but I cannot obtain a shell. I tried different payloads, Do you have any hints?
bro how u found that web
check network interfaces when you get the first shell as J. Then use your favorite scanning tool
hello i’m root but I can’t find the flag… ???
did u find now
No…
need help ?
I thought it was a bug. I visited datastore, tried to decrypt secret.txt, tried to recover the .zip files but it seemed empty … Yes if there is a solution I would like help
bro there in backups there are zip files check thme
Hey all,
I found the exploit and made the changes but still not getting the reverse shell, Please help!
where are u stuck
I got the exploit made changes to the code that will trigger the alert but still not getting the shell
are u at initial foothold?
gin bro
i just start machine and found mail of admin and hash but hash not cracked am i on right path or am i in rabbit hole ?