No.2783
I've done a few of them without too much assistance. Honestly, the community is pretty damn good on trying to not reveal too much to people struggling as to not give away the solution. I'm not very good at it yet, still have lots of soykaf to learn.
What skill level are you looking for? Getting down and dirty with hands-on pentesting is the best way to start learning, so sounds like a really good opportunity for beginners to get into the trade.
No.2785
>>2783Well Im looking for mid level guys, however beginners are also welcome.
I passed all the entry boxes, but i feel like i need people which will hold me from giving up on hard boxes, lol
No.2786
>>2781Total beginner here - due to financial constraints I won't have my pentesting environment set up for a couple of weeks, but once I do then count me in. I'll also be doing hackthissite, just looking for the most practice opportunities I can get.
No.2787
>>2781I'm probably good at reverse engineering and binary exploitation but haven't tried to hack something at htb labs. So, looks like I'm a beginner at penetration testing, but I'm interested in this kind of stuff. How can I join you?
No.2789
>>2786>>2787Any messengers?
No.2790
>>2789I have an account at telegram. You can create a group and share a link to it
No.2794
>>2790To create group i need to have at least 2 members. PM me there @owodelta
No.2795
Woah, telegram shilling thread. Back to facebook, pajeets.
No.3052
I was able to get in the site, but I'm a scrub at utilizing new exploits outside of msf, let alone privesc. Still reading on it. I was able to get user access on the easiest box, but did not have time to read up on privescing from the user part.
Other than reading up what some running processes exist, is there any other pro tips for these kinds of CTFs?
No.3105
test
No.3114
>>3052It's almost always never a fire and forget exploit.
There's a machine on that network that makes you create a custom payload using a stuxnet attack vector.