Posts by Tag

TryHackMe

GateKeeper - TryHackMe (OSCP STYLE)

Can you get past the gate and through the fire? This machine from the buffer overflow group presents us with two challenges: discovering a buffer overflow in an application and escalating privileges. The only hint I’m going to give you is that enumeration and lateral thinking are important.

Relevant - TryHackMe (OSCP STYLE)

You have been assigned to a client that wants a penetration test conducted on an e nvironment due to be released to production in seven days. With this introduction, TryHackMe proposes us the following challenge, basically they ask us to perform a black box pentest simulating that we are going to test the security of an application that will go into production in 7 days

Skynet - TryHackMe (OSCP STYLE)

In this post, I will be explaining the resolution of a CTF machine that features vulnerabilities such as visible shared resources and cron tasks with administrator permissions. CTF machines are designed to simulate real-world cybersecurity challenges, and in this case, we will be exploring the steps to overcome the security measures of this particular machine. By understanding the techniques used to exploit these vulnerabilities, we can gain valuable insights into the importance of proper security measures and the risks associated with failing to implement them

GameZone - TryHackMe (OSCP STYLE)

On TryHackMe, the challenge of the Game ZOne Machine is to be solved either through SQLiMap or manually. This machine runs on Linux operating system. For this particular challenge, the manual approach will be followed to solve it, you’ll see my method to find manual SQLi and retrive all the data from the victim’s database

Back to Top ↑

windows

GateKeeper - TryHackMe (OSCP STYLE)

Can you get past the gate and through the fire? This machine from the buffer overflow group presents us with two challenges: discovering a buffer overflow in an application and escalating privileges. The only hint I’m going to give you is that enumeration and lateral thinking are important.

Relevant - TryHackMe (OSCP STYLE)

You have been assigned to a client that wants a penetration test conducted on an e nvironment due to be released to production in seven days. With this introduction, TryHackMe proposes us the following challenge, basically they ask us to perform a black box pentest simulating that we are going to test the security of an application that will go into production in 7 days

Back to Top ↑

Linux

Tenet - HackTheBox (OSCP STYLE)

During the process of resolving Tenet, I faced several challenges, since I worked as an Application Tester I could easy indefy a vulnerability in a backup code, also inside the machine I achieve the privilege escalation through a race condition, this machine is perfect for Developers that want to make their code more secure.

Skynet - TryHackMe (OSCP STYLE)

In this post, I will be explaining the resolution of a CTF machine that features vulnerabilities such as visible shared resources and cron tasks with administrator permissions. CTF machines are designed to simulate real-world cybersecurity challenges, and in this case, we will be exploring the steps to overcome the security measures of this particular machine. By understanding the techniques used to exploit these vulnerabilities, we can gain valuable insights into the importance of proper security measures and the risks associated with failing to implement them

GameZone - TryHackMe (OSCP STYLE)

On TryHackMe, the challenge of the Game ZOne Machine is to be solved either through SQLiMap or manually. This machine runs on Linux operating system. For this particular challenge, the manual approach will be followed to solve it, you’ll see my method to find manual SQLi and retrive all the data from the victim’s database

Back to Top ↑

Jenkins

Back to Top ↑

Hydra

Back to Top ↑

BufferOverFlow

Back to Top ↑

HackTheBox

Tenet - HackTheBox (OSCP STYLE)

During the process of resolving Tenet, I faced several challenges, since I worked as an Application Tester I could easy indefy a vulnerability in a backup code, also inside the machine I achieve the privilege escalation through a race condition, this machine is perfect for Developers that want to make their code more secure.

Back to Top ↑

Unquoted Service Path

Back to Top ↑

HFS

Back to Top ↑

Wordpress

Back to Top ↑

Pivoting

Back to Top ↑

Docker

Back to Top ↑

Default Credentials

Back to Top ↑

RCE

Back to Top ↑

SetIMpersonatePrivilege

Back to Top ↑

Exposed Services

GameZone - TryHackMe (OSCP STYLE)

On TryHackMe, the challenge of the Game ZOne Machine is to be solved either through SQLiMap or manually. This machine runs on Linux operating system. For this particular challenge, the manual approach will be followed to solve it, you’ll see my method to find manual SQLi and retrive all the data from the victim’s database

Back to Top ↑

SQLi

GameZone - TryHackMe (OSCP STYLE)

On TryHackMe, the challenge of the Game ZOne Machine is to be solved either through SQLiMap or manually. This machine runs on Linux operating system. For this particular challenge, the manual approach will be followed to solve it, you’ll see my method to find manual SQLi and retrive all the data from the victim’s database

Back to Top ↑

CVE-2012-2982

GameZone - TryHackMe (OSCP STYLE)

On TryHackMe, the challenge of the Game ZOne Machine is to be solved either through SQLiMap or manually. This machine runs on Linux operating system. For this particular challenge, the manual approach will be followed to solve it, you’ll see my method to find manual SQLi and retrive all the data from the victim’s database

Back to Top ↑

SetImpersonatePrivilege

Back to Top ↑

CVE-2019-6714

Back to Top ↑

NFS

Skynet - TryHackMe (OSCP STYLE)

In this post, I will be explaining the resolution of a CTF machine that features vulnerabilities such as visible shared resources and cron tasks with administrator permissions. CTF machines are designed to simulate real-world cybersecurity challenges, and in this case, we will be exploring the steps to overcome the security measures of this particular machine. By understanding the techniques used to exploit these vulnerabilities, we can gain valuable insights into the importance of proper security measures and the risks associated with failing to implement them

Back to Top ↑

Wilcard Priv Escalation

Skynet - TryHackMe (OSCP STYLE)

In this post, I will be explaining the resolution of a CTF machine that features vulnerabilities such as visible shared resources and cron tasks with administrator permissions. CTF machines are designed to simulate real-world cybersecurity challenges, and in this case, we will be exploring the steps to overcome the security measures of this particular machine. By understanding the techniques used to exploit these vulnerabilities, we can gain valuable insights into the importance of proper security measures and the risks associated with failing to implement them

Back to Top ↑

BurpSuite BruteForce

Skynet - TryHackMe (OSCP STYLE)

In this post, I will be explaining the resolution of a CTF machine that features vulnerabilities such as visible shared resources and cron tasks with administrator permissions. CTF machines are designed to simulate real-world cybersecurity challenges, and in this case, we will be exploring the steps to overcome the security measures of this particular machine. By understanding the techniques used to exploit these vulnerabilities, we can gain valuable insights into the importance of proper security measures and the risks associated with failing to implement them

Back to Top ↑

SMB

Skynet - TryHackMe (OSCP STYLE)

In this post, I will be explaining the resolution of a CTF machine that features vulnerabilities such as visible shared resources and cron tasks with administrator permissions. CTF machines are designed to simulate real-world cybersecurity challenges, and in this case, we will be exploring the steps to overcome the security measures of this particular machine. By understanding the techniques used to exploit these vulnerabilities, we can gain valuable insights into the importance of proper security measures and the risks associated with failing to implement them

Back to Top ↑

Joomla 3.7.0

Back to Top ↑

Lateral Priv Escalation

Back to Top ↑

Yum SUDO permissions

Back to Top ↑

Wireshark

Back to Top ↑

BackDoor

Back to Top ↑

Enumerate

Back to Top ↑

HashCat

Back to Top ↑

SMB Enumeration

Relevant - TryHackMe (OSCP STYLE)

You have been assigned to a client that wants a penetration test conducted on an e nvironment due to be released to production in seven days. With this introduction, TryHackMe proposes us the following challenge, basically they ask us to perform a black box pentest simulating that we are going to test the security of an application that will go into production in 7 days

Back to Top ↑

SeImpersonatePrivilege

Relevant - TryHackMe (OSCP STYLE)

You have been assigned to a client that wants a penetration test conducted on an e nvironment due to be released to production in seven days. With this introduction, TryHackMe proposes us the following challenge, basically they ask us to perform a black box pentest simulating that we are going to test the security of an application that will go into production in 7 days

Back to Top ↑

Cracking

Relevant - TryHackMe (OSCP STYLE)

You have been assigned to a client that wants a penetration test conducted on an e nvironment due to be released to production in seven days. With this introduction, TryHackMe proposes us the following challenge, basically they ask us to perform a black box pentest simulating that we are going to test the security of an application that will go into production in 7 days

Back to Top ↑

Reverse Engieneer

Back to Top ↑

Windows

Back to Top ↑

CheatSheet

Back to Top ↑

BufferOverflow

GateKeeper - TryHackMe (OSCP STYLE)

Can you get past the gate and through the fire? This machine from the buffer overflow group presents us with two challenges: discovering a buffer overflow in an application and escalating privileges. The only hint I’m going to give you is that enumeration and lateral thinking are important.

Back to Top ↑

BrowserCache

GateKeeper - TryHackMe (OSCP STYLE)

Can you get past the gate and through the fire? This machine from the buffer overflow group presents us with two challenges: discovering a buffer overflow in an application and escalating privileges. The only hint I’m going to give you is that enumeration and lateral thinking are important.

Back to Top ↑

htpasswd

Back to Top ↑

Latex Injection

Back to Top ↑

Bad Sudo Permissions

Back to Top ↑

PHP Deserialization

Tenet - HackTheBox (OSCP STYLE)

During the process of resolving Tenet, I faced several challenges, since I worked as an Application Tester I could easy indefy a vulnerability in a backup code, also inside the machine I achieve the privilege escalation through a race condition, this machine is perfect for Developers that want to make their code more secure.

Back to Top ↑

RaceCondition

Tenet - HackTheBox (OSCP STYLE)

During the process of resolving Tenet, I faced several challenges, since I worked as an Application Tester I could easy indefy a vulnerability in a backup code, also inside the machine I achieve the privilege escalation through a race condition, this machine is perfect for Developers that want to make their code more secure.

Back to Top ↑