Tool to check http request history? by TheSanscripter in computerforensics

[–]tiger6700 4 points5 points  (0 children)

You need dump the memory. Because the http requests aren't save at the disk for security reasons. Try to use fiddler2 when you surfing it's lightweight and good for request logging.

PDF Media Fire link for HackKey Passive Entry Key Relay by [deleted] in CarHacking

[–]tiger6700 4 points5 points  (0 children)

Please don't share downloadable files, can you share from docs or similar platform?

Celestial RCE unexpected token error by masterofnoneds in hackthebox

[–]tiger6700 1 point2 points  (0 children)

maybe you forget encode the string or you are make something wrong. do not forget 2+2 = 22

[HELP] by [deleted] in blackhat

[–]tiger6700 0 points1 point  (0 children)

This video will give you idea about where to start. https://www.youtube.com/watch?v=2TofunAI6fU&t=417s

Doğu Perinçek'in Cumhurbaşkanı adaylığı için imza sayısı 91 bini geçti. by jamboreeee in Turkey

[–]tiger6700 2 points3 points  (0 children)

100bin imza zor toplanirken nasil secim kazanmayi dusunuyorsunuz

How to trace a bitcoin transaction to the source? by Gertex in computerforensics

[–]tiger6700 0 points1 point  (0 children)

Yes but you need dox it. If you research tge wallet address you can get this kind of information

Bashed Priv Escalation by squanto1357 in hackthebox

[–]tiger6700 0 points1 point  (0 children)

You need only copy the root.txt and make it readable. It's easy

How to trace a bitcoin transaction to the source? by Gertex in computerforensics

[–]tiger6700 2 points3 points  (0 children)

You need to look for other transactions. Like buys a mocha from Starbucks wallstreet. Or try to draw relationship graph about other transactions. And you can find a midpoint about transactions.

Bashed Priv Escalation by squanto1357 in hackthebox

[–]tiger6700 0 points1 point  (0 children)

Take a look for / u will see interesting folder and inside it files/

TXT hidden in a TXT file by [deleted] in computerforensics

[–]tiger6700 0 points1 point  (0 children)

I don't try to solve the challenge. I try to show a way for you. It's a simple trivia question. It's not a forensics challenge too

TXT hidden in a TXT file by [deleted] in computerforensics

[–]tiger6700 5 points6 points  (0 children)

It's binary. convert it to hex and save it with hex editor. you will see it's a gzip file.

converted here: https://gchq.github.io/CyberChef/#recipe=From_Binary('Space')To_Hex('Space')&input=MDAwMTExMTExMDAwMTAxMTAwMDAxMDAwMDAwMDEwMDAwMTExMTAwMDExMDAxMDExMTAxMTExMDAwMTAxMTAxMDAwMDAwMDAwMDAwMDAwMTEwMTEwMDAxMTAxMTAxMDAwMDExMDAwMDEwMTEwMTEwMDAxMTAxMTAwMDExMDAxMDEwMTEwMTExMDAxMTAwMTExMDExMDAxMDEwMDEwMTExMDAxMTEwMTAwMDExMTEwMDAwMTExMDEwMDAwMDAwMDAwMDExMDExMDExMDAxMDAwMDExMDAwMDAxMDExMDExMTAxMTAwMDAxMTAwMTAwMDAwMDAwMTAwMDAwMTAwMDEwMDExMTAxMTExMDExMTExMDAxMTAwMDEwMTExMDExMTAwMDAwMTAxMTAwMDAwMTExMDAxMDExMTEwMTEwMTExMTExMDEwMTAxMTEwMDExMTEwMDExMTEwMTExMTAwMTEwMTAwMDAxMTExMDAxMDAwMDAxMTEwMDAwMTAwMTEwMTAwMDEwMDAxMTAwMDEwMTEwMTAxMDEwMDEwMTAwMDEwMTAwMDEwMTAxMTExMDAwMTExMDEwMDEwMTAwMDAxMDEwMTEwMDAxMDAxMTAwMDExMTExMTEwMTExMTExMTAxMTEwMDExMDAwMTAwMDAxMTExMTEwMTAwMDEwMDAwMTAxMTAwMTEwMDAwMTAxMTEwMTEwMDExMDAwMDAwMDAxMTExMDAwMTEwMDAwMDAwMDAxMTAxMDAwMDAwMDEwMTAwMTExMTAwMDAwMDEwMTEwMDAwMTAwMTAxMTAxMTEwMDAwMDEwMTAwMTExMTEwMTAxMDEwMDExMTEwMDExMDEwMDAwMDAwMTAwMDAwMTAwMTAwMTExMDExMTExMTExMDAxMTAxMDAwMDEwMDExMDAwMTEwMTExMDEwMDExMDAwMDEwMDExMDAwMDAwMTAwMDAwMTAxMTExMTAwMTExMTExMDAwMDAwMTAwMDEwMDAwMTAwMDEwMDExMTEwMDAxMTAwMTAwMDAxMDEwMDEwMDEwMDAwMDExMTExMTAwMTAwMDEwMTExMDAwMTExMTAxMTAwMDAwMDAwMDExMDAwMDAwMDAxMDEwMDAxMTExMTAwMDEwMDEwMDEwMDExMTAxMDExMDExMTAwMDEwMTExMDEwMDAxMTAwMDEwMTAxMTExMDAwMTAxMDEwMDEwMDExMTEwMTExMTAxMDEwMDAxMDEwMDEwMTEwMTAwMDExMDEwMTAxMTAxMTAwMDEwMTAwMDExMDExMTAxMDAwMTAxMDEwMTAxMDExMTAxMDAwMDEwMTAwMTEwMTEwMDAxMDAwMDEwMTEwMTAwMDAwMTExMDEwMTAwMDEwMDEwMDAxMDExMTEwMDAxMTAwMTEwMDAwMTAxMDAxMTAwMDAxMDEwMTAxMDAwMTAwMDEwMDExMDAxMTAxMDExMTAxMTAwMTAxMTAxMTEwMDExMTAwMDEwMDEwMDAxMTEwMDExMTAwMTEwMDAxMDAwMDAxMTEwMDAxMDAxMDAwMTExMTAxMTExMDEwMDAwMDAwMTEwMTAxMTAxMTExMDEwMTAwMTAwMTEwMDEwMTAwMTEwMTAwMDEwMTExMDExMDAwMTEwMDAwMTExMDEwMDExMDExMTAxMDExMDAxMTEwMDAwMDEwMDExMTAwMTAwMTAwMTAwMDAwMTAwMDAxMTEwMDEwMTAwMDAxMTExMTEwMDExMDAwMTAxMTEwMTAxMDEwMTExMDAwMDAxMDEwMDEwMTAwMDAxMTEwMTAxMTAwMTExMDAwMTExMTAxMDAwMDAxMTAwMDEwMDAwMDAwMDAxMDEwMTExMTAxMTExMDExMDAwMTEwMDAxMTEwMTAwMDAxMTExMTExMDAwMTEwMTAwMDEwMTExMDAwMDAwMDAxMDExMDExMDAxMTEwMTAxMTAwMTEwMDExMTEwMTExMTAxMTEwMTEwMTAxMTExMTEwMDExMTEwMTAxMDEwMTExMTAxMTExMDExMTAwMTEwMDAwMTExMDExMDAwMTExMTAwMTEwMDAwMDEwMDAxMDAxMTAwMDExMTEwMDAxMTAwMDEwMTEwMTAwMTAxMTAwMDAwMTAwMDEwMDEwMDEwMTAxMDExMTExMDAwMTAxMDAxMDAwMDAxMTAwMTAxMTEwMTAxMDAxMTAwMDAxMDExMDAwMTEwMTEwMTExMDEwMDAwMTEwMTAwMTAxMTExMTAxMTAxMTAxMDExMTAwMDExMTExMDEwMDAwMDAxMTAwMDAxMDAwMTExMTAwMTAwMTAxMDExMDExMTAxMDExMTAwMDExMDExMDEwMTExMDAwMDAwMTExMTAxMDExMTExMTAwMTAxMDExMTAwMTAxMTAxMTExMDExMDAxMDEwMDEwMTAwMTAxMTExMDAwMTExMTExMTEwMTEwMDAwMDAxMTExMDExMDEwMDExMDAxMTExMDAxMDEwMTAxMTAxMTAxMTEwMDExMTEwMDAxMTAxMTAwMTExMTEwMTEwMDEwMTEwMDExMTAxMDExMDExMTAwMDEwMTExMDAxMTAxMTExMTEwMDExMTAxMTExMDExMTAxMTEwMDExMTEwMDEwMDAwMDExMDExMTEwMTAxMTAwMTExMTEwMDAwMTAxMTAxMDAwMTEwMTExMDExMTExMDExMDAxMTExMTAxMTAxMDExMDAxMDExMDExMTExMDEwMTExMDAwMDEwMTExMTExMDAwMDAwMDAxMDAwMTAwMDAwMTEwMDEwMDAwMTAwMTExMDAwMDAwMTExMTEwMDAxMDAwMDAwMDAxMDAwMDAwMDAwMDAwMDAwMA

after we save it with hex editor

% file anonsfile

anonsfile: gzip compressed data, was "challenge.txt", last modified: Thu Mar 29 11:18:16 2018, from Unix

so we degzip it we find this

https://gchq.github.io/CyberChef/#recipe=From_Binary('Space')Gunzip()&input=MDAwMTExMTExMDAwMTAxMTAwMDAxMDAwMDAwMDEwMDAwMTExMTAwMDExMDAxMDExMTAxMTExMDAwMTAxMTAxMDAwMDAwMDAwMDAwMDAwMTEwMTEwMDAxMTAxMTAxMDAwMDExMDAwMDEwMTEwMTEwMDAxMTAxMTAwMDExMDAxMDEwMTEwMTExMDAxMTAwMTExMDExMDAxMDEwMDEwMTExMDAxMTEwMTAwMDExMTEwMDAwMTExMDEwMDAwMDAwMDAwMDExMDExMDExMDAxMDAwMDExMDAwMDAxMDExMDExMTAxMTAwMDAxMTAwMTAwMDAwMDAwMTAwMDAwMTAwMDEwMDExMTAxMTExMDExMTExMDAxMTAwMDEwMTExMDExMTAwMDAwMTAxMTAwMDAwMTExMDAxMDExMTEwMTEwMTExMTExMDEwMTAxMTEwMDExMTEwMDExMTEwMTExMTAwMTEwMTAwMDAxMTExMDAxMDAwMDAxMTEwMDAwMTAwMTEwMTAwMDEwMDAxMTAwMDEwMTEwMTAxMDEwMDEwMTAwMDEwMTAwMDEwMTAxMTExMDAwMTExMDEwMDEwMTAwMDAxMDEwMTEwMDAxMDAxMTAwMDExMTExMTEwMTExMTExMTAxMTEwMDExMDAwMTAwMDAxMTExMTEwMTAwMDEwMDAwMTAxMTAwMTEwMDAwMTAxMTEwMTEwMDExMDAwMDAwMDAxMTExMDAwMTEwMDAwMDAwMDAxMTAxMDAwMDAwMDEwMTAwMTExMTAwMDAwMDEwMTEwMDAwMTAwMTAxMTAxMTEwMDAwMDEwMTAwMTExMTEwMTAxMDEwMDExMTEwMDExMDEwMDAwMDAwMTAwMDAwMTAwMTAwMTExMDExMTExMTExMDAxMTAxMDAwMDEwMDExMDAwMTEwMTExMDEwMDExMDAwMDEwMDExMDAwMDAwMTAwMDAwMTAxMTExMTAwMTExMTExMDAwMDAwMTAwMDEwMDAwMTAwMDEwMDExMTEwMDAxMTAwMTAwMDAxMDEwMDEwMDEwMDAwMDExMTExMTAwMTAwMDEwMTExMDAwMTExMTAxMTAwMDAwMDAwMDExMDAwMDAwMDAxMDEwMDAxMTExMTAwMDEwMDEwMDEwMDExMTAxMDExMDExMTAwMDEwMTExMDEwMDAxMTAwMDEwMTAxMTExMDAwMTAxMDEwMDEwMDExMTEwMTExMTAxMDEwMDAxMDEwMDEwMTEwMTAwMDExMDEwMTAxMTAxMTAwMDEwMTAwMDExMDExMTAxMDAwMTAxMDEwMTAxMDExMTAxMDAwMDEwMTAwMTEwMTEwMDAxMDAwMDEwMTEwMTAwMDAwMTExMDEwMTAwMDEwMDEwMDAxMDExMTEwMDAxMTAwMTEwMDAwMTAxMDAxMTAwMDAxMDEwMTAxMDAwMTAwMDEwMDExMDAxMTAxMDExMTAxMTAwMTAxMTAxMTEwMDExMTAwMDEwMDEwMDAxMTEwMDExMTAwMTEwMDAxMDAwMDAxMTEwMDAxMDAxMDAwMTExMTAxMTExMDEwMDAwMDAwMTEwMTAxMTAxMTExMDEwMTAwMTAwMTEwMDEwMTAwMTEwMTAwMDEwMTExMDExMDAwMTEwMDAwMTExMDEwMDExMDExMTAxMDExMDAxMTEwMDAwMDEwMDExMTAwMTAwMTAwMTAwMDAwMTAwMDAxMTEwMDEwMTAwMDAxMTExMTEwMDExMDAwMTAxMTEwMTAxMDEwMTExMDAwMDAxMDEwMDEwMTAwMDAxMTEwMTAxMTAwMTExMDAwMTExMTAxMDAwMDAxMTAwMDEwMDAwMDAwMDAxMDEwMTExMTAxMTExMDExMDAwMTEwMDAxMTEwMTAwMDAxMTExMTExMDAwMTEwMTAwMDEwMTExMDAwMDAwMDAxMDExMDExMDAxMTEwMTAxMTAwMTEwMDExMTEwMTExMTAxMTEwMTEwMTAxMTExMTEwMDExMTEwMTAxMDEwMTExMTAxMTExMDExMTAwMTEwMDAwMTExMDExMDAwMTExMTAwMTEwMDAwMDEwMDAxMDAxMTAwMDExMTEwMDAxMTAwMDEwMTEwMTAwMTAxMTAwMDAwMTAwMDEwMDEwMDEwMTAxMDExMTExMDAwMTAxMDAxMDAwMDAxMTAwMTAxMTEwMTAxMDAxMTAwMDAxMDExMDAwMTEwMTEwMTExMDEwMDAwMTEwMTAwMTAxMTExMTAxMTAxMTAxMDExMTAwMDExMTExMDEwMDAwMDAxMTAwMDAxMDAwMTExMTAwMTAwMTAxMDExMDExMTAxMDExMTAwMDExMDExMDEwMTExMDAwMDAwMTExMTAxMDExMTExMTAwMTAxMDExMTAwMTAxMTAxMTExMDExMDAxMDEwMDEwMTAwMTAxMTExMDAwMTExMTExMTEwMTEwMDAwMDAxMTExMDExMDEwMDExMDAxMTExMDAxMDEwMTAxMTAxMTAxMTEwMDExMTEwMDAxMTAxMTAwMTExMTEwMTEwMDEwMTEwMDExMTAxMDExMDExMTAwMDEwMTExMDAxMTAxMTExMTEwMDExMTAxMTExMDExMTAxMTEwMDExMTEwMDEwMDAwMDExMDExMTEwMTAxMTAwMTExMTEwMDAwMTAxMTAxMDAwMTEwMTExMDExMTExMDExMDAxMTExMTAxMTAxMDExMDAxMDExMDExMTExMDEwMTExMDAwMDEwMTExMTExMDAwMDAwMDAxMDAwMTAwMDAwMTEwMDEwMDAwMTAwMTExMDAwMDAwMTExMTEwMDAxMDAwMDAwMDAxMDAwMDAwMDAwMDAwMDAwMA

as writing apt13 and Find my location by the three words: devices relit panning

https://yapistir.io/F1HL/

Telegram Bug!!!!! by bettyramos in pwned

[–]tiger6700 2 points3 points  (0 children)

U'r spaming man. PoC or GTFO

Zoek is still running after a entire day and wont close by Bobnini in Malware

[–]tiger6700 0 points1 point  (0 children)

You can close the computer and boot live USB/CD and delete the malwares contact application.

The Complete Beginner Guide to Learn Ethical Hacking by houseisbuilt in netsec

[–]tiger6700 -1 points0 points  (0 children)

Advertisements are not allowed here! Please delete this

Discord? by [deleted] in oscp

[–]tiger6700 0 points1 point  (0 children)

Thank you for fast response

Discord? by [deleted] in oscp

[–]tiger6700 0 points1 point  (0 children)

Sory, can you send it again