Type your comment> @darkchocolat said:
I found the .x*** file, i have spent days on try to extract information on it! The file is empty! please help. PM me…
Have you taken it for a walk?
Type your comment> @darkchocolat said:
I found the .x*** file, i have spent days on try to extract information on it! The file is empty! please help. PM me…
Have you taken it for a walk?
After lots os struggling I managed to get User and Root. I laughed when I finally got the uncles joke.
I learned so much, but i wanted to quit like 10 times. Feel free to PM me.
Hi! Could someone PM me I need help for root.txt. I am stucck on privesc…
Type your comment> @Malone5923 said:
@garbo77 . String it up ?
I find .xlsm file but when i try to use more command to open it doesnt work and get command to transfer the file neither
Type your comment> @jagomezg said:
I found C*****.xl** file, is it a rabbit hole?
any idea how to open the file? more is not working
Type your comment
any idea how to open .xl… file? I use more command and does not work and I also use get to transfer it but does not work neither
Having trouble with de ms****.py and im****t. Even though I downloaded the latest version, I sill get some TLS error.
Can anyone help?
I would appreciate any hint or PM
Thank a lot> @dm7500 said:
So far, I’ve found the ‘r********’ user creds via the E**** macro file. It works as a windows login for SMB shares, but I’m kind of stuck beyond that. I’m trying to use the tools in I******t to enumerate or find something new, but no luck so far.
I’ve read up on the retired G**** box, so I get how to grab the N*** hash, but I don’t see a way to make the server connect back to my share, as I don’t see a place to S**i
Any hints as to the next step?
Same boat…
Amazing box, i learned a lot about Windows. Kudos to the creator!!
So far, I’ve found the ‘r********’ user creds via the E**** macro file. It works as a windows login for SMB shares, but I’m kind of stuck beyond that. I’m trying to use the tools in I******t to enumerate or find something new, but no luck so far.
I’ve read up on the retired G**** box, so I get how to grab the N*** hash, but I don’t see a way to make the server connect back to my share, as I don’t see a place to S**i
Any hints as to the next step?
Type your comment> @dm7500 said:
So far, I’ve found the ‘r********’ user creds via the E**** macro file. It works as a windows login for SMB shares, but I’m kind of stuck beyond that. I’m trying to use the tools in I******t to enumerate or find something new, but no luck so far.
I’ve read up on the retired G**** box, so I get how to grab the N*** hash, but I don’t see a way to make the server connect back to my share, as I don’t see a place to S**i
Any hints as to the next step?
Same boat…
Took me over 2 weeks to get root. Loved this box, really good learning experience in a windows environment. More windows boxes like this please. Kudos to the creator and thanks to @ARainchik for direction.
What a good box! I learned a lot from this box PM me if you need help
Type your comment> @staz0t said:
Type your comment> @staz0t said:
I’m in the db. I’m trying to send a request to my server (re**r) so that i can fetch the Nv2.
But, my server is always excepting the error “Errno 104 Connection reset by peer”Initially before using Im*****t to authenticate, I also tried me*******t modules. I was getting the same error. Can someone help me with this?
Update: The problem was with my machine and mis-configured server that was handling the request. It’s solved.
same problem here how did you fix it?
Got root shell!
Awesome box, learned a lot about Windows enumeration & priv esc.
Also learned new tricks with I*****t and M-**L.
Thanks to @DarkNight2019 for some hints with initial shell.
Feel to PM me if you need help with the box.
Having issues with reverse shell on this box. I am a windows noob. Can anyone point me in the right direction? I have m**vc account and can run commands.
Please DM
What to do after getting the NT hash. I tried to crack it but unsuccessful. Do we have to use those hash to login to some other service or do something more with the MS*** queries.
Please dm for any hints.
Thanks