Hack the Box — Lame Just another TJ Null box preparing for the OSCP on a Sunday. Recon nmap -sC -sV -O -oA nmap/initial 10.10.10.3 nmap -sC -sV -O -p- -oA nmap/full 10.10.10.3 nmap -sU -...
Hack the Box — Nibbles
Hack the Box — Nibbles In this walkthrough, we will be exploring the “Nibbles” machine from Hack the Box, without using Metasploit. Reconnaissance We begin with our reconnaissance phase, where...
Hack the Box — Devel
Hack the Box — Devel One of the first HTB boxes I solved a few months ago from the TJ Null List in preparation for the PNPT and OSCP. Solving the “Devel” box can be divided into 3 main steps: ...
Hack the Box — Optimum
Hack the Box — Optimum With and Without Metasploit Originally, I solved this box as part of the TCM Security Practical Ethical Hacking course with Metasploit but Heath, the instructor, did me...
Rooting Kioptrix Level 1 with Metasploit
Rooting Kioptrix Level 1 with Metasploit This was a part of my PNPT coursework NMAP Scan nmap -T4 -p- -A 192.168.2.128 We found port 139 open Searchsploit searchsploit samba | grep trans2ope...
flAWS.cloud Cloud Security Misconfigurations Challenge
flAWS is a fun AWS based security misconfiguration challenge created by Scott Piper from Summit Route. I started playing around with it here and there in 2020. I decided to document the whole pr...
- 1
- 1 / 1