Official Trickster Discussion

I can’t find the famous port 5000 try several tools such as fscan nmap of all interface but nothing around 5000

You might have missed something during your enumeration.

Summary

You may have something only locally accessible

fscan should get you there; you tried all interfaces, but what about its neighbors?

got it, finally got the user flag.
what is the next hint, please?

if you found the hash(s) for j"“” , then you should rockyou

how did you find the c******** ?

I did the ch******* exploit manually, and I can execute commands, but I cannot obtain a shell. I tried different payloads, Do you have any hints?

bro how u found that web

check network interfaces when you get the first shell as J. Then use your favorite scanning tool

Hi. I found the vulnerable application running on the docker instance and the corresponding exploit but I fail to execute commands even though notifications are triggered. Could I dm you for some guidance?

hello i’m root but I can’t find the flag… ???

did u find now

No…

need help ?

1 Like

I thought it was a bug. I visited datastore, tried to decrypt secret.txt, tried to recover the .zip files but it seemed empty … Yes if there is a solution I would like help

bro there in backups there are zip files check thme

Hi. I found the vulnerable application running on the docker instance and the corresponding exploit but I fail to execute commands even though notifications are triggered. Could I dm you for some guidance?

Hey all,

I found the exploit and made the changes but still not getting the reverse shell, Please help!

where are u stuck

I got the exploit made changes to the code that will trigger the alert but still not getting the shell