TryHackMe - Res
Description Hello hackers, I hope you are doing well. We are doing Res from TryHackMe. We find a misconfigured databases that we exploit to get rce on the target and then a reverse shell. Th...
Description Hello hackers, I hope you are doing well. We are doing Res from TryHackMe. We find a misconfigured databases that we exploit to get rce on the target and then a reverse shell. Th...
Description Hello hackers, I hope you are doing well. We are doing Shoker from HackTheBox. In this machine, we us the shellshock exploit to gain foothold, and a sudo misconfiguration gives u...
Description Hello hackers, I hope you are doing well. We are doing OpenAdmin from HackTheBox. It’s an easy machine running a web server with a service vulnerable to rce allowing us to get ea...
Description Hello hackers, I hope you are doing well. We are doing Nibbles from HackTheBox. The target is running a vulnerable service allowing us to get foothold. Exploit sudo permission gi...
Description Hello hackers, I hope you are doing well. We are doing Gaming Server from TryHackMe. The machines is running a webserver that has some hidden directories and files in which we fi...
Description Hello hackers, I hope you are doing well. We are doing Blaster from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {target...
Description Hello hackers, I hope you are doing well. We are doing Django from PwnTillDawn. The target is running a FTP server where we can directory traversal. With that, we find root password ...
Description Hello hackers, I hope you are doing well. We are doing Bashed from HackTheBox. The box is running a webserver that we scan for files and we find an important one that give us acc...
Description Hello hackers, I hope you are doing well. We are doing Mr. Blue from PwnTillDawn. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {target_...
Description Hello hackers, I hope you are doing well. We are doing Beep from HackTheBox. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {target_I...