Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
Well, i checked all systems and found no configuration file on any of them with the possible E-Mail Address of the User Im looking for. I got the Username and Password from the Admin, however if I send a E-Mail to that user (which matches other company E-Mails i found) i get no reply to my RShell E-Mail.
Assuming from you answer, there should be one?
I honestly think it's a bug as it's impossible to open ports where the services aren't installed as well as there being no list of emails anywhere.
If Xephael knows of a way and wants to stop trolling then I'd love to gain the 'knowledge' he's talking about. Unless it's all a bluff.
Added you
So, either; And this is allllllllllllllllll Rshell related
A. You must use a router bounce exploit in order to gain a file shell. "Router bouncing" is the act of using a vulnerable router to 'exploit network traffic' (More layman - exploit the router to exploit the computer) and gain access that way. Then you may gather the emails needed to rshell the computer you need to gain the file. You may be able to just SCP the file over in this case;
and more rarely
B. You must use the CCTV cameras in order to extract information that'll best help you to gain an email for the victim you are attacking.
You must gain an email for 2 users in the network. ONE to crack and take advantage of, and the other, the victim on the local IP you are attacking. If you send your social engineering attempt through your primary email, you are NOT ONLY exposing yourself to multiplayer spam attacks (I leave this in because you might want to one day open yourself to Multiplayer which houses amazing subscription-based tools such as RedFox.py) the user will 95% of the time respond with "I don't know you."
It has been established that it is in fact a bug if there's a cctv sitting behind a pretty locked down switch, it will keep saying failed to reach address once you get on the same subnet.
But creating the exploit was a pretty fun challenge.