OffSec - BackupBuddy
Backupbuddy is an intermediate-level challenge from the OffSec Playground, perfect for those aiming for their OSCP. It’s designed to test your enumeration skills, particularly web enumeration, to uncover vulnerabilities.
1337 or Elite, The Cybersecurity write-ups for the true cyber e1ite! Offsec, Hack The Box, and more🕵️‍♂️ Whether you're diving into the latest exploits or sharpening your skills 🛠️.
Backupbuddy is an intermediate-level challenge from the OffSec Playground, perfect for those aiming for their OSCP. It’s designed to test your enumeration skills, particularly web enumeration, to uncover vulnerabilities.
Air is an intermediate-level box in the OffSec Playground. Just a heads-up for this walk-through: I’ll jump straight into the steps to get a foothold on the machine, followed
Alright, let’s dive into this box, which officially sits at an intermediate level on Offsec’s Playground called "Access". But here’s the catch: the community collectively
Introduction In this challenge, I investigated a suspicious Windows shortcut file named trick or treat.lnk. A .lnk file, also known as a Windows Shortcut file, is a file that
OffSec - Bunyip Walkthrough In this walkthrough, we’ll exploit an MD5 length extension vulnerability in a web application to gain initial access. From there, we’ll abuse sudo privileges
Walkthrough of vmdak Introduction Hello everyone! I'm back with another walkthrough. This time, I tackled "VMDak," an intermediate-level Linux box from OffSec Proving Grounds. This box
Walkthrough of BillyBoss Introduction This write-up details an intermediate-level box from Offsec's labs, rated as "Very Hard" by the community. The lab can be accessed here.
Overview This is a hands-on, simulated threat hunting sprint set within the fictional enterprise network of Megacorp One. This is a relevant and similar to what you might expect from
Walkthrough for PlanetExpress Summary In this walkthrough, we will exploit an exposed PHP-FPM FastCGI implementation to gain an initial foothold. We will then escalate privileges by exploiting a misconfiguration in
Challenge Overview Challenge Name Category Difficulty Link Sugar Free Candies Crypto Very Easy Link to Challenge Description For years, strange signals pulsed through the air on the eve of October
Challenge Overview Challenge Name Category Difficulty Link Sekur Julius Crypto Very Easy Link to Challenge Description Hidden deep in the forest was an ancient scroll, rumored to grant immense power
Co-authored by Iftekharul Haque (Hawk) Here, we first choose what kind of machine learning model we want to use in this process. As anyone with some little machine learning model
In today’s world, our workstations, servers, and mobile devices are more vulnerable than ever. They are prime targets for cybercriminals looking to execute malicious code and infiltrate networks. With
In this write-up, we will explore how to effectively hunt for ransomware from a network perspective, focusing on identifying Indicators of Compromise (IoCs) related to LockBit ransomware. The scenario in
In today’s complex cybersecurity landscape, no organization can afford to work in isolation. For threat hunters, success hinges on two key factors: timely intelligence and effective communication. In Module