arisuchan    [ tech / cult / art ]   [ λ / Δ ]   [ psy ]   [ ru ]   [ random ]   [ meta ]   [ all ]    info / stickers     temporarily disabledtemporarily disabled

/cyb/ - cyberpunk and cybersecurity

low life. high tech. anonymity. privacy. security.
Name
Email
Subject
Comment

formatting options

File
Password (For file deletion.)

Help me fix this shit. https://legacy.arisuchan.jp/q/res/2703.html#2703

Kalyx ######


File: 1525580786218.png (3.55 KB, 256x256, logo-transparent.png)

 No.2781


Does anyone want to team up for HTB labs?
I couldn't find any people who are interested in this.
So if someone wants, please reply to this thread

resource: hackthebox.eu

 No.2783

I've done a few of them without too much assistance. Honestly, the community is pretty damn good on trying to not reveal too much to people struggling as to not give away the solution. I'm not very good at it yet, still have lots of soykaf to learn.

What skill level are you looking for? Getting down and dirty with hands-on pentesting is the best way to start learning, so sounds like a really good opportunity for beginners to get into the trade.

 No.2785

>>2783

Well Im looking for mid level guys, however beginners are also welcome.

I passed all the entry boxes, but i feel like i need people which will hold me from giving up on hard boxes, lol

 No.2786

>>2781

Total beginner here - due to financial constraints I won't have my pentesting environment set up for a couple of weeks, but once I do then count me in. I'll also be doing hackthissite, just looking for the most practice opportunities I can get.

 No.2787

>>2781
I'm probably good at reverse engineering and binary exploitation but haven't tried to hack something at htb labs. So, looks like I'm a beginner at penetration testing, but I'm interested in this kind of stuff. How can I join you?

 No.2789

>>2786
>>2787
Any messengers?

 No.2790

>>2789
I have an account at telegram. You can create a group and share a link to it

 No.2794

>>2790
To create group i need to have at least 2 members. PM me there @owodelta

 No.2795

Woah, telegram shilling thread. Back to facebook, pajeets.

 No.2824


 No.3052

I was able to get in the site, but I'm a scrub at utilizing new exploits outside of msf, let alone privesc. Still reading on it. I was able to get user access on the easiest box, but did not have time to read up on privescing from the user part.

Other than reading up what some running processes exist, is there any other pro tips for these kinds of CTFs?

 No.3105

test

 No.3114

>>3052
It's almost always never a fire and forget exploit.
There's a machine on that network that makes you create a custom payload using a stuxnet attack vector.

 No.3115

File: 1533368184194.jpg (454.94 KB, 700x992, welrod.jpg)

Fuck I'd be down but just started working on a cert, once I'm done I'll do some HTB w/ ya



[Return] [Go to top] [ Catalog ] [Post a Reply]
Delete Post [ ]