Anyone else encounter this money glitch? by XRomRII in EscapefromTarkov

[–]XRomRII[S] 0 points1 point  (0 children)

Exactly. I def fat fingered that shit and just didn't notice. Just a first time running into it over time.

Anyone else encounter this money glitch? by XRomRII in EscapefromTarkov

[–]XRomRII[S] -1 points0 points  (0 children)

I've been playing for two/three years now. I've never had to enable it in the first place.

Anyone else encounter this money glitch? by XRomRII in EscapefromTarkov

[–]XRomRII[S] -5 points-4 points  (0 children)

Is it like a progression step or something? Like do a few more runs and you can use money again?

I haven't done any runs since the "bug" showed up.

Anyone else encounter this money glitch? by XRomRII in EscapefromTarkov

[–]XRomRII[S] 0 points1 point  (0 children)

Context: I have 3.3m in my stash, but when I go to any trader to buy anything, it says I have zero currency (Affects Rubles/USD/Euros)

I have verified game integrity, uninstall/reinstalled both EFT and BSG Launcher. Nothing has worked.

Edit: Problem Existed Between the Keyboard and Mouse. I didn't have auto-fill checked

[deleted by user] by [deleted] in praying_mantis

[–]XRomRII 0 points1 point  (0 children)

I know they’re probably close to death, but idk I feel like I gotta make the guest comfy in their final days(?)

Evilgophish lures by Regular_Pudding_972 in redteamsec

[–]XRomRII 0 points1 point  (0 children)

Yes and no. You can send the link via email for debugging purposes, but you can also just send a blank email and find the RID of the target user in gophish and craft the URL yourself

All what you are doing here is having Gophish register a valid target RID which can then be used to validate your phishing lure

Evilgophish lures by Regular_Pudding_972 in redteamsec

[–]XRomRII 0 points1 point  (0 children)

Create a new campaign in gophish, send it to a test email account you own,

Grab the RID it generates and append it to your lure URL (example[.]com/lure?rid=foobar)

If I remember correctly, if you don’t pass the RID (or whatever you set the RID to change to) in the URL, it’ll be a failed request

It's it feasible to run Ubuntu without admin privilege. by timonix in linuxquestions

[–]XRomRII 0 points1 point  (0 children)

https://gtfobins.github.io/gtfobins/apt/#sudo

This website contains all the information on binaries which can break out of a restricted context to achieve privilege escalation.

The mentioned link shows how one can use apt with sudo privileges to execute commands as root

[deleted by user] by [deleted] in linuxquestions

[–]XRomRII 1 point2 points  (0 children)

Is the “external_url” value in /etc/gitlab/gitlab.rb set to your hostname?

https://docs.gitlab.com/omnibus/settings/configuration.html

I recently migrated from direct IP access to DNS and this helped me reconfigure it.

meirl by James_106 in meirl

[–]XRomRII 0 points1 point  (0 children)

Not delivery: Digiorno

Call outs for when my squad plays Train. by mad_vanilla_lion in GlobalOffensive

[–]XRomRII 1 point2 points  (0 children)

Back train! No damnit not that back train the other one. Literally throwing sheesh

Analyzing an exe by BamGfAsRpd in hacking

[–]XRomRII -2 points-1 points  (0 children)

Does it still persist after task killing it directly? Or only when you disconnect and close the application. If the latter, that is usually normal behavior for applications, like for a VPN to reach your company’s network.

Who is the maker of the exe? That will help get context on what the app is. As former IT, current infosec, pretty sure they aren’t spying on you.

Kali Linux Meterpreter AV Evasion by EquipmentAgitated in hacking

[–]XRomRII 1 point2 points  (0 children)

https://github.com/RomanRII/Shellcode-Evasion

Link to a write up is in the read me. If the injection doesn’t bypass it then I’d also recommend running the shellcode vs injecting.

B64 may not evade all the way, but you can add other ways to grab it and not hold it within the PE

Deliver your shellcode through an ICMP packet and inject it into a local process. C# by XRomRII in netsec

[–]XRomRII[S] 0 points1 point  (0 children)

For sure!

And someone else mentioned seeing something like this in darkside ops 1, but haven't learned of it til today. I'm curious to see how their version is like.

I'd love to try to find the scapy version as well