[Hack The Boo] Day 3 Challenges
by - Thursday, January 1, 1970 at 12:00 AM
thax bro
Reply
(October 24, 2022, 03:34 PM)killerbee Wrote:
(October 24, 2022, 03:25 PM)deathfrom Wrote:
(October 24, 2022, 03:21 PM)killerbee Wrote:
(October 24, 2022, 03:15 PM)deathfrom Wrote: This works:
sqlmap -r tmp.txt --dbs --dbms=MySQL -v 3 --batch -D horror_feeds -T users --dump


where I can do this?


In your terminal. Capture a request when you register


terminal of the browser right? 
sorry for my infinite dumbness I didn't got it lol


download sqlmap and innstall python3, then run python3 sqlmap from cmd (winndows+R cmd)
Reply
(October 24, 2022, 03:34 PM)killerbee Wrote:
(October 24, 2022, 03:25 PM)deathfrom Wrote:
(October 24, 2022, 03:21 PM)killerbee Wrote:
(October 24, 2022, 03:15 PM)deathfrom Wrote: This works:
sqlmap -r tmp.txt --dbs --dbms=MySQL -v 3 --batch -D horror_feeds -T users --dump


where I can do this?


In your terminal. Capture a request when you register


terminal of the browser right? 
sorry for my infinite dumbness I didn't got it lol


sqlmap is a dedicated python3 tool.
On arch and debian based distros you can install it using your packet manager, it will be available as a terminal command. Another option is downloading it and using with python.
Reply
Thanks
Reply
thanks
Reply
Reverse and Forensics were pretty simple Just working on Web now. SQLi is returning a bunch of bcrpyt hashes, but JtR isn't cracking them.
Reply
(October 24, 2022, 01:50 PM)Hacker2222 Wrote: plz discuss here


reversing challenge:
thanks @HTBContestant


ty
Reply
(October 24, 2022, 04:00 PM)karhu Wrote: Reverse and Forensics were pretty simple Just working on Web now. SQLi is returning a bunch of bcrpyt hashes, but JtR isn't cracking them.


I am not sure what that value is for the admin account. It doesn't look like a hash and it is not a valid password either
Reply
(October 24, 2022, 01:50 PM)Hacker2222 Wrote: plz discuss here


reversing challenge:
thanks @HTBContestant
g


g
Reply
(October 24, 2022, 04:04 PM)deathfrom Wrote:
(October 24, 2022, 04:00 PM)karhu Wrote: Reverse and Forensics were pretty simple Just working on Web now. SQLi is returning a bunch of bcrpyt hashes, but JtR isn't cracking them.


I am not sure what that value is for the admin account. It doesn't look like a hash and it is not a valid password either


Yeah, my sqlmap returned ~300 hashes. JtR hasn't cracked any of them. Not sure where to go from here.
Reply


 Users viewing this thread: [Hack The Boo] Day 3 Challenges: No users currently viewing.