Hack The Box - Redeemer
Upon launching the machine in the HTB, I was promptly provided with an IP address to begin my exploration. My first step was to ensure a stable connection by pinging
Upon launching the machine in the HTB, I was promptly provided with an IP address to begin my exploration. My first step was to ensure a stable connection by pinging
Recon #nmap nmap --top-ports 1000 -T4 [LAB_IP] --open -Pn -vvv PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 80/tcp open http syn-ack 139/tcp open netbios-ssn syn-ack
This writeup covers walkthrough of another HTB "Starting Point" machines entitled as "Fawn". First let us navigate to Fawn machine challenge and download the VPN (.ovpn)
Youtube walkthrough Decoding and Cracking Flags from Pcap Files Challenge file The pcap contents show various TCP streams containing flags: The observed flag, picoCTF{[SHA256_REDACTED]}, seems to be encoded
Solving a CTF Challenge: Decoding the Secret Message In this blog post, I will walk you through the steps I took to solve a Capture the Flag (CTF) challenge, where
Upon spawning the machine, we got the ip address of the target machine. Let's run nmap to find the open ports using the following command - nmap -sV
Hijacking the outpost responsible for housing the messengers of the core gangs, we have managed to intercept communications between a newly-elected leader and the Tariaki, a well-established and powerful gang.
Not too long ago, your cyborg detective friend John Love told you he heard some strange rumours from some folks in the Establishment that he's searching into. They
The crew sets their sights on an abandoned fertilizer plant, a desolate structure rumored to hold a cache of ammonium nitrate—crucial for their makeshift explosives. Navigating through the plant’
Security Incident Summary On April 19, 2024, between 4:35 PM and 6:00 PM, our network experienced a coordinated cyberattack involving multiple offenses. The incident began with over 109
Hello everyone! I am a entering into cybersecurity and just cracked my first challenge on the Hackthebox platform. Today, I'm sharing my experience tackling one of the "
Executive Summary Incident Overview On April 19, 2024, a security breach was detected in our AWS account, originating from a Russian IP address. The unauthorized access led to the deployment
Summary It checks out the system environment, sets up a scheduled service, downloads google chrome profile cache data, and uploads it to a remote server. A highly SEO optimized github
Demo Summary CVE-2024-1086 is a critical vulnerability in the Linux kernel that allows an attacker to gain full root privileges on a wide range of systems. This exploit, dubbed CVE-2024-1086
Summary CVE-2021-3493 is a #linux-kernel exploit that basically takes vulnerable default configs for Ubuntu Linux kernels up to version 5.10 (Patched in 5.11) and gives access to the