If we say confirmed sent, that means whatever wallet you're using on Alby has received the sats. You should reach out to them if it doesn't show up in the wallet soon.
There isn't a way to use Phoenix but we plan to add auto withdrawals and non-custodial options where possible. It's on my personal top 3 big priority list.
New week, new opportunities, new time to grow and learn more about the best discovery of our lifetime! Bitcoin!!! Learning and stacking sats to cold storage daily!
Good morning everyone!!! Monday is here and the week has just begun, time to step it up and Give it our best, if we start the week fully motivated it will give us the boost to stay like that the rest of the week, you can do this, I know you can, you've been through worse times and you're still here standing, nothing can put you down but yourself, whatever others thing it don't matter, you can be your best friend or your worst enemy. Be your best. I wish you oodles of success and as always be well and stay frosty.
Hyped for the last privilege escalation we need to do for a university lab about penetration testing.
Spent the whole night yesterday until 5AM to get root on a machine. After trying out a lot of stuff, the solution was to put PATH="$HOME/bin:$PATH" into the .bashrc of the user and then create a file which reads standard input and writes that into a file under $HOME/bin/sudo since the user we got access to is regularly logged into using ssh and calls sudo -S.
This took so long to find out but it's very rewarding to have finally figured it out. Had to read a lot about login shells vs non-interactive shells etc. I found the solution after I basically already gave up but wanted to try out one last thing... I was shocked when it actually worked lol
Now I am hyped for the last machine. Maybe we'll also find a solution there now. We've been stuck at the two last privilege escalations for 2 weeks now.
PATH="$HOME/bin:$PATH"
into the.bashrc
of the user and then create a file which reads standard input and writes that into a file under$HOME/bin/sudo
since the user we got access to is regularly logged into usingssh
and callssudo -S
.