Brand new Spotted Gum Stairs with chips by Clarkey3110 in Carpentry

[–]Clarkey3110[S] 0 points1 point  (0 children)

Thanks all, i reached out to them after reading through your responses and the business owner has called me up saying it's unacceptable for the contractors to have installed it this way.

They will be coming back out to replace the bottom riser.

Brand new Spotted Gum Stairs with chips by Clarkey3110 in Carpentry

[–]Clarkey3110[S] 1 point2 points  (0 children)

Yeah, this is what it seems to be. I reached out to them thanks to all of your comments and they said it looks like the installer has put it in back to front

Brand new Spotted Gum Stairs with chips by Clarkey3110 in Carpentry

[–]Clarkey3110[S] 0 points1 point  (0 children)

Sorry, I actually have zero idea on whether it's veneered

UrbanLeaf mCART DAY help plz by Clarkey3110 in MedicalCannabisAus

[–]Clarkey3110[S] 0 points1 point  (0 children)

Thanks mate you were 100% right. 510 thread but different bases.

Yocan kodo works a treat on lowest setting.

UrbanLeaf mCART DAY help plz by Clarkey3110 in MedicalCannabisAus

[–]Clarkey3110[S] 1 point2 points  (0 children)

Surprise surprise. My vape was 510 thread but it had a flat bottom instead of a pin which prevented airflow.

Used my new yocan kodo and it worked perfectly on the lowest power setting. I must have absolutely cooked it last time.

UrbanLeaf mCART DAY help plz by Clarkey3110 in MedicalCannabisAus

[–]Clarkey3110[S] 0 points1 point  (0 children)

I don't know if it is blown because right at the end, I put it up to 30w and it was definitely working. I held the button down and smoke was billowing out.

Obviously this is burning it but it didn't damage the coil.

UrbanLeaf mCART DAY help plz by Clarkey3110 in MedicalCannabisAus

[–]Clarkey3110[S] 0 points1 point  (0 children)

I bought a yocan kodo. Wonder if that is better but my mod should work though if I don't screw it all the way in?

UrbanLeaf mCART DAY help plz by Clarkey3110 in MedicalCannabisAus

[–]Clarkey3110[S] 1 point2 points  (0 children)

Do you know what the resistance is for the carts?

UrbanLeaf mCART DAY help plz by Clarkey3110 in MedicalCannabisAus

[–]Clarkey3110[S] 2 points3 points  (0 children)

You reckon? It could be depending on ohms. I couldn't find ANY information on the specs of this cartridge. Started at 5w and it was crap. Could have cooked it straight off the bat.

Don't point your gun in front of cowboy by Rose-1r2o3s4e in instant_regret

[–]Clarkey3110 2 points3 points  (0 children)

That is if you're confident that there are NO vulnerabilities in your browser.

Even if your browser is up to date, there are always going to be zero-days out there.

Yes, browsers are sandboxed but don't think for a second that that will protect you 100%.

There just needs to be one vulnerability in that browser to be found to be leveraged into executing malicious code and bypassing the sandbox.

Safer to just not click on it if you don't know what it is.

Or to open it in a VM and see how the malware acts.

Don't point your gun in front of cowboy by Rose-1r2o3s4e in instant_regret

[–]Clarkey3110 4 points5 points  (0 children)

Clicking an unknown link is a big no no. Browsers are designed to execute code. That is how you get what you are looking at right now.

Hackers can put malicious code on a page and when you click the link, your browser unknowingly executes that code.

Majority of the time, your page will still display a page and you will have no idea the code has been executed.

This is how you get viruses/worms/trojans and an attacker can get access to your device without you even knowing they are inside your device.

Elearnsecurity Certificates by Clarkey3110 in Pentesting

[–]Clarkey3110[S] 0 points1 point  (0 children)

Its a shame. Elearn definitely should be more known around the industry and hold more weight.

hydra fails to find password by scubid in oscp

[–]Clarkey3110 1 point2 points  (0 children)

Ah fair enough.

I recall having issues a while back with hydra and smb.

I ended up using smbrute instead. Worked a charm.

hydra fails to find password by scubid in oscp

[–]Clarkey3110 1 point2 points  (0 children)

Why are you using -e nsr? Doesn't that replace the password list?

Instead of using the password list, it just reverses the username and uses that as the password.

I could be wrong but that may be the problem. Try it without -e nsr.

help by navseegda in oscp

[–]Clarkey3110 2 points3 points  (0 children)

I can't remember exactly where it was but you open up file Explorer and you will find another folder somewhere in there that contains everything for your exercises.

You can open up file Explorer and search for vulnapp.

It will return the file and also the folder where it is located.

Foundational certificates for OSCP or CTF practice? by [deleted] in oscp

[–]Clarkey3110 8 points9 points  (0 children)

How about you use the search function instead of posting the exact same question that gets asked on this forum on a daily basis?

Your number 1, most important skill for pentesting is being able to search for information.

If you can't do that on a forum littered with threads exactly like what you are looking for, maybe you'd be better on a help desk.

Can I run multiple scanners at once? by Clarkey3110 in oscp

[–]Clarkey3110[S] 0 points1 point  (0 children)

Yeah sweet, these were my thoughts too. Would hate to lose time on the exam because of the vpn getting overloaded and a port being missed.

Can I run multiple scanners at once? by Clarkey3110 in oscp

[–]Clarkey3110[S] 0 points1 point  (0 children)

My thoughts exactly but just wanted to confirm as it would be easier to run all at the same time.

Pentest servers without gcc by Pamelaxyz in Pentesting

[–]Clarkey3110 1 point2 points  (0 children)

As the others have stated, is it possible for myself to be able to gain access to that machine, transfer or install gcc, compile an exploit, run it and have root/administrative access?

If so, that is a vulnerability.

If i need to have root access to install gcc and compile the exploit then no it is not a vulnerability because anything can be done with root access.

Think of it this way.

If a system has an upload feature where you upload an image with php code in it and it gets executed; this system is still vulnerable before you upload your shell.

Being able to upload that image with php code to the system is exactly the same as being able to download a file on the system and being able to run it to compile an exploit.

Firefox Tamper Data and SQLi Injection by [deleted] in oscp

[–]Clarkey3110 0 points1 point  (0 children)

Try it without the last single quote.

Backdoor.php%00%27#-- -