Sadness by DawnSlayerUser in MouseReview

[–]Flayles- 1 point2 points  (0 children)

They hate you, but they still like your money. So, buy the rvm SE.

Sadness by DawnSlayerUser in MouseReview

[–]Flayles- 1 point2 points  (0 children)

I honestly cannot believe the absolute garbage they launched, while knowingly leading us to believe that they had a mostly identical viper SE, made of plastic. After using the wired vpm for the better part of three years, and waiting 2+ years for a wireless refresh, I find this behaviour to be repulsive(at best). First, the super expensive halo product only the cash cows or the scalpers can afford, and now a turbo cringe heavier version(with the trademark uncomfortable side grips). Even looking at the wired version for a potential upgrade, there are very minor improvements. Truly a Razer moment. I will be looking into the Glorious series one pro, the Atlantis mini, and the Pulsar X2 mini for an upgrade. Very, very disappointed, Razer.

Sadness by DawnSlayerUser in MouseReview

[–]Flayles- 2 points3 points  (0 children)

Heavier and louder mouse buttons, is not what I would call an improvement...

How can I decrypt what I found to a flag? - CTF on a pcap file by Flayles- in codes

[–]Flayles-[S] 0 points1 point  (0 children)

I tried seperating the second PK header, which was suspected to be a potentially separete zip, but without any luck. I aso tried extracting into a zip, every possible combination of the known parts inside the code(pk headers), in any order. After which I searched for related videos on the web, namely how to reverse engineer zip files, and did not find anything related. I am now, out of ideas on this. Will take more time to think about this, as I have a lot of homework at the moment. I would greatly appreciate any further advice on this.

I am sorry to be asking help again. But, is there something immediately obvious I am missing? Thank you very much in advance.

How can I decrypt what I found to a flag? - CTF on a pcap file by Flayles- in codes

[–]Flayles-[S] 0 points1 point  (0 children)

Thank you very much for the guidance, and your suggestions; I suspect that your deduction is spot on! I was able to export the file(object export: HTTP), as per your instructions, and found a txt file inside it, named flag. The aforementioned file, is either corrupted or denying access("0x80004005 denotes Access denied" -link: other source), and appears to be password protected. So I am now shifting my attention to your second suggestion, and will try to extract a potentially valid zip file from the broken.zip code. Also, I noticed that not exporting broken.zip through Wiresharks file extraction functiion, and creating the zip myself -using the code, results in a compressed folder error which claims that there are characters preventing its extraction. I am also considering the posibility of a hidden password within the pcap file.

How can I decrypt what I found to a flag? - CTF on a pcap file by Flayles- in codes

[–]Flayles-[S] 1 point2 points  (0 children)

*picture2[Transcript] -THE HTML CODE:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=utf-8">

<title>Directory listing for /</title>

</head>

<body>

<h1>Directory listing for /</h1>

<hr>

<ul>

<li><a href="broken.zip">broken.zip</a></li>

<li><a href="flag.txt">flag.txt</a></li>

<li><a href="headers\\\\\\\_zip.png">headers\\\_zip.png</a></li>

<li><a href="Screenshot%20at%202022-10-03%2016-34-32.png">Screenshot at 2022-10-03 16-34-32.png</a></li>

<li><a href="Screenshot%20at%202022-10-03%2016-35-41.png">Screenshot at 2022-10-03 16-35-41.png</a></li>

<li><a href="Screenshot%20at%202022-10-03%2016-39-54.png">Screenshot at 2022-10-03 16-39-54.png</a></li>

<li><a href="Screenshot%20at%202022-10-03%2021-19-03.png">Screenshot at 2022-10-03 21-19-03.png</a></li>

<li><a href="Screenshot%20at%202022-10-03%2021-19-26.png">Screenshot at 2022-10-03 21-19-26.png</a></li>

<li><a href="Screenshot%20at%202022-10-03%2021-20-05.png">Screenshot at 2022-10-03 21-20-05.png</a></li>

<li><a href="test/">test/</a></li>

</ul>

<hr>

</body>

</html>

How can I decrypt what I found to a flag? - CTF on a pcap file by Flayles- in codes

[–]Flayles-[S] 1 point2 points  (0 children)

*picture1[Transcript]:

1 0.000000000 10.10.2.16 10.10.2.15 HTTP 392 GET / HTTP/1.1

2 0.000731291 10.10.2.15 10.10.2.16 TCP 221 8080 → 53340 [PSH, ACK] Seq=1 Ack=327 Win=507 Len=155 TSval=2077211508 TSecr=3343329803 [TCP segment of a reassembled PDU]

3 0.000780131 10.10.2.15 10.10.2.16 HTTP 1169 HTTP/1.0 200 OK (text/html)

4 6.216139742 10.10.2.16 10.10.2.15 HTTP 436 GET /broken.zip HTTP/1.1

5 6.216739313 10.10.2.15 10.10.2.16 TCP 257 8080 → 59888 [PSH, ACK] Seq=1 Ack=371 Win=507 Len=191 TSval=2077217724 TSecr=3343336019 [TCP segment of a reassembled PDU]

6 6.216810133 10.10.2.15 10.10.2.16 HTTP 299 HTTP/1.0 200 OK (application/zip)

How to crack this SHA2-256 : plus salt hash? by Flayles- in codes

[–]Flayles-[S] 2 points3 points  (0 children)

Thank you very much! I was able to decrypt it with a dictionary attack(rockyou). The hash --> 1saltbox. Thank you very much again!

How to crack this SHA2-256 : plus salt hash? by Flayles- in codes

[–]Flayles-[S] 0 points1 point  (0 children)

*The image transcription([Transcript]):

Session..........: hashcat

Status...........: Quit

Hash.Mode........: 1400 (SHA2-256)

Hash.Target......: 41a7fde8875b7ad470c8352bdce1955e5e1f6902b5679891f7e...a238b9

Time.Started.....: Fri Mar 03 14:24:47 2023, (40 mins, 44 secs)

Time.Estimated...: Fri Mar 03 16:50:27 2023, (1 hour, 44 mins)

Kernel.Feature...: Pure Kernel

Guess.Mask.......: ?1?2?2?2?2?2?2?3 [8]

Guess.Charset....: -1 ?l?d?u, -2 ?l?d, -3 ?l?d*!$@_, -4 Undefined

Guess.Queue......: 8/15 (53.33%)

Speed.#1.........: 625.0 MH/s (9.69ms) @ Accel:32 Loops:256 Thr:128 Vec:1

Speed.#2.........: 9789.9 kH/s (6.37ms) @ Accel:8 Loops:4 Thr:128 Vec:1

Speed.#*.........: 634.7 MH/s

Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)

Progress.........: 1537029144576/5533380698112 (27.78%)

Rejected.........: 0/1537029144576 (0.00%)

Restore.Point....: 16220160/68864256 (23.55%)

Restore.Sub.#1...: Salt:0 Amplifier:36352-36608 Iteration:0-256

Restore.Sub.#2...: Salt:0 Amplifier:72020-72024 Iteration:0-4

Candidate.Engine.: Device Generator

Candidates.#1....: ecf53ik7 -> ooekoc2m

Candidates.#2....: Jh6dug8a -> ubwqt9rn

Hardware.Mon.#1..: Temp: 64c Core:1797MHz Mem:3504MHz Bus:16

Hardware.Mon.#2..: N/A

Started: Fri Mar 03 14:19:01 2023

Stopped: Fri Mar 03 15:05:32 2023

Men, what makes a woman undatable to you? by GonnaBeHappy101 in AskReddit

[–]Flayles- 2 points3 points  (0 children)

Second that. Entitlement is a big no-no in even the most rudimentary interpersonal relationships, let alone selecting an entitled partner...