I've been doing the same thing for years: "man command | grep keyword" UNTIL I learned "man command" then hit "/keyword" - much more efficient and context-aware. Thanks for showing us the thought process - it is valuable
The way you go through all your ideas to find the solution is very very helpful and educational, don't worry about the long video, we're here to learn, thanks!
hi there in the previous video you have an issue for creating a file in tmp folder, the command mktemp -d might be a good idea for creating a random, not used, temp folder in /tmp/ folder ;)
this is my simple python solution: f = open("pins","w") for x in range(10000): f.write('UoMYTrfrBFHyQXmg6gzctqAwOmw1IohZ %d ' % x) f.close() then run: nc localhost 30002 < pins so generate a file of pins then send this to netcat
I'm sure there is a cleaner way to accomplish this, but I just did this: As part of the script I put the output into results.txt with the following line: for i in {0000..9999}; do echo $password $i done | nc localhost 30002 >> results.txt I ran the script in the shell and then ran the following to count how many wrong results were printed: grep -c "Wrong" results.txt The result is 9297. This means that the PIN is 9297 (you have to include 0000 as an attempt also) I checked by manually entering the password and PIN and it is correct.
Can someone help me please, when I go to run the shell (lvl24) this problem appears: -bash: ./brute.sh: bin/bash: bad interpreter: No such file or directory I've tried several ways, I did it in nano, vim, I used sed, dos2unix and nothing works!
This is a year after the fact so sorry if this is old news, but it looks like you wrote your shebang wrong for your bash script. It is: #!/bin/bash Not #!bin/bash
I've been doing the same thing for years: "man command | grep keyword" UNTIL I learned "man command" then hit "/keyword" - much more efficient and context-aware. Thanks for showing us the thought process - it is valuable
was stuck here for a day. thanks a lot for the video! had a laugh with that shellfish thing at 28:12
The way you go through all your ideas to find the solution is very very helpful and educational, don't worry about the long video, we're here to learn, thanks!
You should stop saying sorry...you're teaching me so much right there! You don't have any reasons to apologise !
that fade is clean af alexis. you look good man
Great learning here. Had a laugh at that fish part ;) 28:12
I wouldn't have solved it myself, thank you!
hi there in the previous video you have an issue for creating a file in tmp folder, the command mktemp -d might be a good idea for creating a random, not used, temp folder in /tmp/ folder ;)
Thank you for pointing this out, I had forgotten that :)
tnx mr
Cheers Mate.
Hi there. I am getting a timeout before the entire script is executed. What can I do about that?
instead of {0000..9999} write {9999..0000}.. not ideal but works since the pass is closer to 9999 end
@@j.stan8916 Saved me, thx
Really great video as always❤️looking forward for the python video
Why do you have a lagging on the video/audio? Great content BTW
Ver good! Iam learning much.
Bro pls make a video on OSCP level ctfs.I have done Mercy
Bro I Cought You
@@ruturajashtekar4004 i cought you
@@htay6042 yo same path studying hacking?
Great job
I would love to see that bash code done in Python
this is my simple python solution:
f = open("pins","w")
for x in range(10000):
f.write('UoMYTrfrBFHyQXmg6gzctqAwOmw1IohZ %d
' % x)
f.close()
then run:
nc localhost 30002 < pins
so generate a file of pins then send this to netcat
@@bob-007 I think he meant with socket library... By which you wouldn't need nc...
my "ugly" way ...
#!/usr/bin/python
import os
pswd = "UoMYTrfrBFHyQXmg6gzctqAwOmw1IohZ"
for i in range(10000):
pin = str(i).rjust(4, '0')
cmd = 'echo "%s %s" >> local.txt' % (pswd, pin)
os.system(cmd)
os.system("nc localhost 30002 < local.txt")
Hackersploit,, 👍👍
Can anyone explain to me why
./list | 'ncat' localhost 30002 does NOT give me the password
but
./list | 'nc' localhost 30002 DOES?
Both commands work fine for me, there might have been an error somewhere else such as a typo perhaps when you changed it?
couldn't connect with openssl we can generate public key from private key we have
You can execute shell commands from more with !
but which one pincode is? - how knows number of pincode?
I'm sure there is a cleaner way to accomplish this, but I just did this:
As part of the script I put the output into results.txt with the following line:
for i in {0000..9999}; do
echo $password $i
done | nc localhost 30002 >> results.txt
I ran the script in the shell and then ran the following to count how many wrong results were printed:
grep -c "Wrong" results.txt
The result is 9297. This means that the PIN is 9297 (you have to include 0000 as an attempt also)
I checked by manually entering the password and PIN and it is correct.
what Linux are you using i know is a stupid question.
If you are just interested in the Desktop Environment it's KDE Plasma 5. You should be able to install that for pretty much any Linux Distro you want.
@@david-varghese thanks
@@xXxSonOfDiabloxXx thanks
Stop apologising! That was fascinating!!
my shell script for bandit25 is not working can anyone help me
First
Can someone help me please, when I go to run the shell (lvl24) this problem appears: -bash: ./brute.sh: bin/bash: bad interpreter: No such file or directory
I've tried several ways, I did it in nano, vim, I used sed, dos2unix and nothing works!
This is a year after the fact so sorry if this is old news, but it looks like you wrote your shebang wrong for your bash script. It is:
#!/bin/bash
Not
#!bin/bash