Don't wanna be here? Send us removal request.
Text
Hackthebox LaCasaDePapel: Walkthrough
Hackthebox LaCasaDePapel: Walkthrough
Summary
LaCasaDePapel is a rather easy machine on hackthebox.eu, featuring the use of php reflection, creating and signing of client certificates and the abuse of a cronjob. Unfortunately the box was very unstable and slow for me and therefore pretty unenjoyable.
User Flag
We start with a quick port scan using nmap -Pn -n -sC -sV…
View On WordPress
#hack the box la casa de papel write up#Hakthebox LaCasaDePapel Walkthrough#lacasadepapel hackthebox forum#lacasadepapel hackthebox root#lacasadepapel hackthebox walkthrough
0 notes
Text
HacktheBox FriendZone: Walkthrough
HacktheBox FriendZone: Walkthrough
As other boxes lets start with nmap scan
NMAP
We have 21,22,53,80,139,443 and 445
PORT 139,445 (SMB)
on enumerating samba share i got general and Development share in general share i have permission to read and in Development read as well write :
Gathering Credentials from general share :
username : admin
Password :…
View On WordPress
#friendzone hackthebox hints#friendzone hackthebox solution#friendzone hackthebox walkthrough#hack the box friendzone writeup#hackthebox friendzone haha#hackthebox friendzone help#hackthebox friendzone hint#hackthebox friendzone hints#hackthebox friendzone root#HacktheBox FriendZone: Walkthrough
0 notes
Text
HacktheBox Netmon: Walkthrough
HacktheBox Netmon: Walkthrough Hey guys today Netmon retired and this is my write-up. I don’t have too much to say about this box , It was a nice easy windows box.
Nmap
As always we will start with nmap to scan for open ports and services :
We Have:
Ftp Port 21 with Anonymous Login Allowed
http port 80 (webserver is running) and prtg network monitor is installed
and some other…
View On WordPress
#hackthebox netmon#hackthebox netmon hint#HacktheBox Netmon: Walkthrough#netmon#netmon hackthebox#netmon hackthebox walkthorough#netmon hackthebox writeup#netmon writeup
0 notes
Text
VulnHub Zico2: 1 Walkthrough
VulnHub Zico2: 1 Walkthrough
VulnHub Zico2: 1 Walkthrough Nmap
I found that this target has only 3 open ports (22 SSH, 80 HTTP, and 111 RPC). I started with the HTTP port by browsing the website hosting on this web server.
Http – Port 80
I found view.php linked to home page.
Check them out Button is linked to /view.php?page=tools.html means maybe LFI will work
URL : /view.php?page=../../../../../etc/passwd
View On WordPress
#vulnhub zico walkthrough#vulnhub zico2 walkthrough\]#VulnHub Zico2: 1 Walkthrough#zico 2 ctf walkthrough#zico 2 write up#zico vulnhub walkthrough#zico2 1#zico2 ctf#zico2 vuln#zico2 vulnhub#zico2 vulnhub walkthrough#zico2 vulnhub walkthroughzico 2#zico2 walkthrough
0 notes
Text
HacktheBox Querier: Walkthrough
HacktheBox Querier: Walkthrough
Nmap
As always we will start with nmap to scan for open ports and services :
Samba Enumeration the only share I could access anonymously was Reports Shares :
In the share there is one file named “Currency Volume Report.xlsm” . I downloaded the file in my system and trying binwalk on it
Inside “Currency Volume Report.xlsm” there are lots of file…
View On WordPress
#hack the box querier walkthrough#hackthebox querier hints#HacktheBox Querier: Walkthrough#querier hackthebox forum#querier hackthebox reddit#querier hackthebox walkthrough#querier hackthebox writeup
0 notes
Text
HacktheBox Help: Walkthrough
HacktheBox Help: Walkthrough
Lets Start With Nmap Scan:
GoBuster
Go Buster Revel dir named support
Checking Directory
Uploading Shell Under Submit a Ticket Section we can upload a file
Now Here attach a phpshell
Dont Mind the error File not Allowed
Help Desk is vulnerable of https://www.exploit-db.com/exploits/40300
Exploiting
Now We can upload our php shell…
View On WordPress
#hack the box help machine hint#hack the box help writeup#hackthebox access help#hackthebox help box#hackthebox help machine walkthrough#hackthebox help machine writeup#HacktheBox Help: Walkthrough#help hackthebox forum#help hackthebox github#help hackthebox hint#help hackthebox hints#help hackthebox root#help hackthebox walkthrough#help hackthebox writeup#help with hack the box
0 notes
Text
HacktheBox Chaos Walkthrough
HacktheBox Chaos Walkthrough
It is a retired vulnerable Machine presented by HacktheBox for helping pentester’s to perform online penetration testing according to your experience level
Difficulty: Medium
Task: To find user.txt and root.txt file
Enumeration Nmap
As always let’s start with nmap scan
nmap -sV -p- 10.10.10.120 Nmap scan report for chaos.htb…
View On WordPress
#chaos hackthebox walkthrough#hack the box chaos walkthrough#hackthebox chaos#hackthebox chaos help#hackthebox chaos hints#hackthebox chaos walkthrough#hackthebox chaos writeup
0 notes
Text
Hackthebox Lightweight Walkthrough
Hackthebox Lightweight Walkthrough
As Always Let’s Start with Nmap Scan
root@kali:~# nmap -sV -p- -oN nmap -v 10.10.10.119 Nmap scan report for 10.10.10.119 Host is up (0.13s latency). Not shown: 65532 filtered ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) 80/tcp open http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.4.16) 389/tcp…
View On WordPress
#Hackthebox Lieghtweight walkthrough#hackthebox lightweight#hackthebox lightweight hints#hackthebox lightweight tcpdump#hackthebox lightweight walkthrough#hackthebox lightweight writeup#lightweight hackthebox#lightweight hackthebox forum#lightweight hackthebox walkthrough#lightweight hackthebox writeup#lightweight machine hackthebox
0 notes
Text
Prtg Network Monitor Exploit With POC
Prtg Network Monitor Exploit With POC
Prtg Network Monitor Exploit With POC
PRTG Network Monitor (Paessler Router Traffic Grapher until version 7) is an agentless network monitoring software from Paessler AG. It can monitor and classify system conditions like bandwidth usage or uptime and collect statistics from miscellaneous hosts as switches, routers, servers and other devices and applications.
Gathering Creds
If you Have…
View On WordPress
#exploiting prtg network monitor#hackthebox netmon#hackthebox netmon hint#hackthebox netmon writeup#HacktheBox Netmon: Walkthrough#prtg network monitor exploit#Prtg Network Monitor Exploit With POC
0 notes
Text
HacktheBox Irked: Walkthrough
HacktheBox Irked: Walkthrough
Let’s start off with scanning the network to find our target.
Scanning
Now here we have bunch of ports open lets go on webserver
IRC is almost working! (Seems Interesting)
Searching For Exploit
Search for irc exploit (metasploit)
As per our nmap scan this is perfect exploit
Exploiting
Lets use it
msfconsole
use…
View On WordPress
#hackthebox irked forum#hackthebox irked help#hackthebox irked hint#hackthebox irked root#hackthebox irked solution#hackthebox irked tips#hackthebox irked walkthrough#hackthebox irked writeup#hackthebox.eu irked#irked hackthebox#irked hackthebox reddit#irked hackthebox walkthrough#irked machine hackthebox#irked writeup
0 notes
Text
HacktheBox Teacher: Walkthrough
HacktheBox Teacher: Walkthrough Nmap
Finding Creds:
Download Image and cat image revels username and password
Username : Giovanni Password : Th4C00lTheacha#
Gobuster
GoBuster Revels dir named “moodle”
Finding Exploit
login with creds
After Doing little research on moodle got this
https://blog.ripstech.com/2018/moodle-remote-code-execution/
Exploiting
Paste in…
View On WordPress
#hackthebox teacher forum#hackthebox teacher hint#hackthebox teacher machine#hackthebox teacher moodle#hackthebox teacher writeup#HacktheBox Teacher: Walkthrough#hackthebox.eu teacher#teacher hackthebox walkthrough#teacher hackthebox writeup
0 notes
Text
How to Hack an Android phone Beginner to Advance
How to Hack an Android phone Beginner to Advance
How to Hack an Android phone Beginner to Advance
Do you want to learn android pen testing or just want to hack your ex-phone? I will explain everything from scratch. You did not need any previous knowledge for this.
Just read this post carefully with patience.
After reading this post, you can hack any android phone (but don’t expect any magic from me).
I will post 2-3 on Android…
View On WordPress
#android 1 hacking hero#android device hacking tricks#android hacking and penetration testing#android hacking apps in hindi#android hacking apps reddit#android hacking apps xda#android hacking books#android hacking codes#android hacking commands#android hacking course#android hacking development#android hacking exploit#android hacking for beginners#android hacking games#android hacking kali linux#android hacking tricks#android hacking tutorial#hacking a android phone#hacking android device on same network#hacking android devices with kali linux#hacking android from pc#How to Hack an Android phone Beginner to Advance#make android a hacking device
0 notes
Text
BSides Vancouver: 2018 (Workshop) -- Walkthrough
BSides Vancouver: 2018 (Workshop) — Walkthrough
BSides Vancouver: 2018 (Workshop) — Walkthrough Description
Boot2root challenges aim to create a safe environment where you can perform real-world penetration testing on an (intentionally) vulnerable target.
This workshop will provide you with a custom-made VM where the goal is to obtain root level access on it.
This is a great chance for people who want to get into pentesting…
View On WordPress
#bside vancouver vulnhub walkthrough#bside vancouver vulnhub writeup#BSides Vancouver: 2018 (Workshop) -- Walkthrough#vulnhub bside vancouver walkthrough#writeup vulnhub bside vancouver
0 notes
Text
Openssl Privilege Escalation(Read Any File)
Openssl Privilege Escalation(Read Any File)
Openssl Privilege Escalation(Read Any File) If You Have Permission To Run Openssl Command as root than you can read any file in plain text no matter which user you are
To do so you need to encrypt the file and then decrypt the file
Encrypting File
openssl aes-256-cbc -a -salt -in secrets.txt -out secrets.txt.en
What This Command Will Do is This Will Encrypt /etc/shadow File…
View On WordPress
#hackthebox Privilege Escalation lightwieght#lightwieght openssl Privilege Escalation#openssl#openssl Privilege Escalation#Openssl Privilege Escalation(Read Any File)#Privilege Escalation with openssl#rean any file with openssl
0 notes
Text
zico2: 1 Vulnhub -- Walkthrough
zico2: 1 Vulnhub — Walkthrough
zico2: 1 Vulnhub — Walkthrough
Level: Intermediate
Goal: Get root and read the flag file
Description:
Zico is trying to build his website but is having some trouble in choosing what CMS to use. After some tries on a few popular ones, he decided to build his own. Was that a good idea?
Hint: Enumerate, enumerate, and enumerate!
Thanks to: VulnHub
Lets Start With Nmap Scan
View On WordPress
#zico 2#zico 2 ctf walkthrough#zico 2 write up#zico2 1#zico2 ctf#zico2 vuln#zico2 vulnhub#zico2 vulnhub walkthrough#zico2 walkthrough
0 notes
Text
LazysysAdmin Vulnhub -- Walkthrough
LazysysAdmin Vulnhub — Walkthrough
LazysysAdmin Vulnhub — Walkthrough
[Description]
Difficulty: Beginner – Intermediate
Aimed at:
> Teaching newcomers the basics of Linux enumeration
[Hints]
Enumeration is key
Try Harder
Look in front of you
Let’s Start with nmap scan
Checking Webserver
GoBuster
We Got (wordpress, phpmyadmin, test, old etc.)
SMB Enumeration
smbmap to see what we can access
View On WordPress
#big lazy sysadmin#lazy sysadmin 1#lazy sysadmin 1 walkthrough#lazy sysadmin ctf#lazy sysadmin download#lazy sysadmin login#lazy sysadmin password#lazy sysadmin powershell#lazy sysadmin write up#lazysysadmin 1 walkthrough#lazysysadmin vulnhub#LazysysAdmin Vulnhub -- Walkthrough#lazysysadmin walkthrough#the lazy sysadmin#vulnhub lazy sysadmin walkthrough#vulnhub lazysysadmin walkthrough
0 notes
Text
Hackfest 2016: Quaoar - Vulnhub Walkthrough
Hackfest 2016: Quaoar – Vulnhub Walkthrough
Hackfest 2016: Quaoar – Vulnhub Walkthrough
I have to say this is the easiest VM I have done so far
Quaoar is the first machine from the series of 3 machine from hackfest2016 and by the creator Viper.
Quaoar is a boot2root virtual machine hosted in vulnhub, created by Viper for Hackfest 2016 CTF. Being a beginner friendly challenge, Quaoar is a perfect machine for people who are new into…
View On WordPress
0 notes