I can’t find the famous port 5000 try several tools such as fscan nmap of all interface but nothing around 5000
You might have missed something during your enumeration.
Summary
You may have something only locally accessible
fscan should get you there; you tried all interfaces, but what about its neighbors?
got it, finally got the user flag.
what is the next hint, please?
if you found the hash(s) for j"“” , then you should rockyou
how did you find the c******** ?
I did the ch******* exploit manually, and I can execute commands, but I cannot obtain a shell. I tried different payloads, Do you have any hints?
bro how u found that web
check network interfaces when you get the first shell as J. Then use your favorite scanning tool
Hi. I found the vulnerable application running on the docker instance and the corresponding exploit but I fail to execute commands even though notifications are triggered. Could I dm you for some guidance?
hello i’m root but I can’t find the flag… ???
did u find now
No…
need help ?
I thought it was a bug. I visited datastore, tried to decrypt secret.txt, tried to recover the .zip files but it seemed empty … Yes if there is a solution I would like help
bro there in backups there are zip files check thme
Hi. I found the vulnerable application running on the docker instance and the corresponding exploit but I fail to execute commands even though notifications are triggered. Could I dm you for some guidance?
Hey all,
I found the exploit and made the changes but still not getting the reverse shell, Please help!
where are u stuck
I got the exploit made changes to the code that will trigger the alert but still not getting the shell