User

@anonymous


WE-REMOTE-CORRUPTME

WE-REMOTE-CORRUPTME  

  Por: reisraff em 12 de Setembro de 2017 às 22:24

Is the lab working well?

After start the enviroment i try to exec nc but:

x@x:~/ $ nc -v lab.shellterlabs.com 32775
nc: connect to lab.shellterlabs.com port 32775 (tcp) failed: Connection refused
x@x:~/ $

 Última edição por: reisraff em 13 de Setembro de 2017 às 14:03, 1 tempo total de edição.
Motivo: identation of code

Re: WE-REMOTE-CORRUPTME  

  Por: nabuco em 13 de Setembro de 2017 às 02:05

Yes, It's working fine.

Have you tried other challenges to see if the same problem occurs?

Re: WE-REMOTE-CORRUPTME  

  Por: reisraff em 13 de Setembro de 2017 às 13:42

Yeah sure, I've tried with these two challenges:

https://shellterlabs.com/en/training/get-started/writing-exploits/questions/we-remote-corruptme/

https://shellterlabs.com/en/training/get-started/writing-exploits/questions/we-simple-rop/

I got to exploit them locally, but when I try remotely I get this error:

user@host:~/$ echo "TEST" | nc -v lab.shellterlabs.com 32816
nc: connect to lab.shellterlabs.com port 32816 (tcp) failed: Connection refused
user@host:~/$

 Última edição por: reisraff em 15 de Setembro de 2017 às 01:42, 1 tempo total de edição.
Motivo: Wrong link

Re: WE-REMOTE-CORRUPTME  

  Por: intrd em 15 de Setembro de 2017 às 04:33

..working here:

Re: WE-REMOTE-CORRUPTME  

  Por: reisraff em 15 de Setembro de 2017 às 12:32

Now I got it ;) Thanks

Re: WE-REMOTE-CORRUPTME  

  Por: nabuco em 15 de Setembro de 2017 às 12:44

Hi, @reisraff!

I've looked into that but everything seems ok. The problem still persists for you? Have you tried using another networks or through a VPN?

Please let me know.

Re: WE-REMOTE-CORRUPTME  

  Por: reisraff em 15 de Setembro de 2017 às 13:06

Hey guys, sorry for point that...

The problem is that I was using a network through a VPN, and obviously there some rules for deny this type of packet.

Re: WE-REMOTE-CORRUPTME  

  Por: nabuco em 15 de Setembro de 2017 às 13:12

No worries. I'm glad that is working for you now. :-)