OffSec - PlanetExpress
Walkthrough for PlanetExpress Summary In this walkthrough, we will exploit an exposed PHP-FPM FastCGI implementation to gain an initial foothold. We will then escalate privileges by exploiting a misconfiguration in
1337 or Elite, The Cybersecurity write-ups for the true cyber e1ite! Offsec, Hack The Box, and more🕵️‍♂️ Whether you're diving into the latest exploits or sharpening your skills 🛠️.
Walkthrough for PlanetExpress Summary In this walkthrough, we will exploit an exposed PHP-FPM FastCGI implementation to gain an initial foothold. We will then escalate privileges by exploiting a misconfiguration in
Challenge Overview Challenge Name Category Difficulty Link Sugar Free Candies Crypto Very Easy Link to Challenge Description For years, strange signals pulsed through the air on the eve of October
Challenge Overview Challenge Name Category Difficulty Link Sekur Julius Crypto Very Easy Link to Challenge Description Hidden deep in the forest was an ancient scroll, rumored to grant immense power
Co-authored by Iftekharul Haque (Hawk) Here, we first choose what kind of machine learning model we want to use in this process. As anyone with some little machine learning model
In today’s world, our workstations, servers, and mobile devices are more vulnerable than ever. They are prime targets for cybercriminals looking to execute malicious code and infiltrate networks. With
In this write-up, we will explore how to effectively hunt for ransomware from a network perspective, focusing on identifying Indicators of Compromise (IoCs) related to LockBit ransomware. The scenario in
In today’s complex cybersecurity landscape, no organization can afford to work in isolation. For threat hunters, success hinges on two key factors: timely intelligence and effective communication. In Module
This is a challenge from picoCTF titled 'trickster' from web exploitation category. It's needless to say that this one is a little trickier as the name
Continuing from my OffSec TH-200 journey… In cybersecurity, ransomware remains one of the most dangerous threats facing organizations today. Ransomware attacks have evolved over the years, and attackers have become
As I continue my journey through the OffSec TH-200 course, I’ve now reached Module 2, Section 1, which delves into some critical areas of cybersecurity: threat actors, ransomware groups,
As cybersecurity threats evolve and become increasingly sophisticated, organizations must adopt proactive measures to safeguard their networks. I’ve recently started the new OffSec TH-200 course, and I could finish
In this task, we will try to hack into a Linux system. You can find the task here In this task on TryHackMe, the objective was to simulate a real-world
This is a challenge from picogym called Shark on Wire 1. The name suggests it's related to Wireshark. You can find the challenge here The challenge gave us
This challenge, titled 'SOAP,' from the web exploitation category on picoCTF, appears to center around an XXE (XML External Entity) vulnerability, as suggested by the associated tags. Upon
Congratulations on your purchase of the RogueWave Kali Pitail Accessory, the ultimate tool for every digital rogue and pentester on the move. Debuted and highlighted at Defcon 2024 as part