Notes
  • 👀About me
  • â„šī¸Good Reads
  • 🌐Web
    • Web Pentesting Checklist
    • Insecure Deserialization
    • Blind XPath Injection
    • GraphQL
    • Reverse Shells
      • IIS
    • Content-Security-Policy
      • XSS (Static Nonce in CSP)
    • LLM (Large Language Models)
  • 📘Windows API
    • C# - P/Invoke
  • ☕Miscellaneous Topics
    • Phishing with Gophish
    • Pentest Diaries
      • SQL Queries via Grafana
      • LDAP Pass Back Attack
      • Misconfigured File Upload to RCE
  • 🧃Hack The Box
    • Intelligence
    • Seal
    • Under Construction
    • Previse
    • Return
    • Sauna
    • Nest
  • 📕TryHackMe
    • Wordpress CVE-2021-29447
    • Attacktiv
    • Fortress
    • internal
  • đŸ› ī¸Cheatsheet
    • Anti-Forensic Techniques
    • JSON - jq
    • Docker
    • Hidden Secrets
    • Database Exploitation
      • PostgreSQL
        • Blind SQLi script
      • SQL Server
    • C Sharp
    • Reversing
      • Windows
    • SSH
    • Python
      • Miscellaneous Scripts
        • Credential Bruteforcing a CLI service
    • Privilege Escalation
      • Windows
    • socat
    • OSINT
      • Shodan
    • Installation
Powered by GitBook
On this page

Was this helpful?

  1. TryHackMe

Fortress

Room: https://tryhackme.com/room/fortress

PreviousAttacktivNextinternal

Last updated 3 years ago

Was this helpful?

If youre reading this, then know you too have been marked by the overlords... Help memkdir /home/veekay/ftp I have been stuck inside this prison for days no light, no escape... Just darkness... Find the backdoor and retrieve the key to the map... Arghhh, theyre coming... HELLLPPPPPmkdir /home/veekay/ftpmkd

python 2.7 byte-compiled strings <*.pyc> uncompyle6 <*.pyc>

â€ĸ Check service running at port lsof -i:<port> kill -9 <PID>

long_to_bytes(232340432076717036154994)

1337-h4x0r [redacted]

t3mple_0f_y0ur_51n5.php/html

USER letmein:) PASS please

gobuster dir -e -u -w /media/lrb/SecLists/Discovery/Web-Content/raft-large-files-lowercase.txt -t 30

â€ĸ sha1 in python hashlib.sha1(<>) - print <sha1-hash>.hexdigest()

â€ĸ urlencode urllib.parse.quote_plus(<>)

â€ĸ SHA1 collision samples: - -

'The guards are in a fight with each other... Quickly retrieve the key and leave the temple: \'m0td_f0r_j4x0n.txt

* Escape a bash restricted shell ssh <>@<> 'bash --noprofile'

####################### Task: 1. php code retrieved. Need to bypass checks to get $spot variable's value 2. sha1 hash collision 3. hashes should not contain 000000 in hex

📕
http://temple.fortress:7331
https://sha-mbles.github.io/#:~:text=Our%20Chosen-Prefix%20Collision%20Example
https://www.linkedin.com/pulse/using-sha1-collision-attack-solve-bostonkeyparty-ctf-rotimi