I need your help fags im blacking out I managed to own a user and the entire system, but its all part of a much greater network Forget bruteforcing other ports, what would you generally look for in an owned machine, nmap excluded
Kayden Nguyen
whats the role of the machine? I'd just listen quietly and see if you can write to a local file or socket somewhere for keystrokes. see if you can find some logins to their intranet services?
Josiah Baker
No its not an active machine, I used a few exploits to get in, its got a bunch of services running, listening has no real sense I tried to get other users' credentials in case they were also the same on other machines too, but to no avail Most of them are behind a firewall so I cant really run exploits, and the one I am into now is airtight so no internet even if I have root
Hudson Wilson
protection bumb
Lincoln James
Is it a user machine? Is it a server? From what you wrote I'd say you hit a honeypot. Hope you used a VPN user!
Andrew Jones
So does anyone know of any hacker themed rpgs?
Anthony Russell
Asked this last thread, got some good input so asking again: how can a hacker make money, apart from having a literal pentesting job and looking for bounties?
Grayson Walker
Use your imagination mr fbi
If you paid any iota of attention to the last thread you would have seen a way...
Jaxon Baker
So, I finished the bandit ctf, and I want to get in further, preferable with web app pentesting. Can anyone recommend a good CTF for me? Inb4 the web application hackers handbook; I've already read it.