There is no excerpt because this is a protected post.
Postman Writeup Summery TL;DR This Writeup is about Postman, on hack the box. It was a Linux box that starts off with Redis exploitation to get an initial foothold. Then we enumerate and find an encrypted ssh key of matt. Next, we crack the ssh key’s passphrase. We use the same credentials on the Webmin […]
Heist Writeup Summery TL;DR This writeup is about Heist, it was a windows box that starts off with a webserver we log in as a guest. There we find a config file in which we find encrypted hash’s. from there we get the password. we do a deep port scan find a winrm open we […]
When I joined hack the box 6 months back I didn’t know what to do I was trying different machines and I was not able to compromise any. played CTF’s before and won them but this was really new CTF challenges were easier than this. I am writing this in a OSCP prep context because […]
Stack Exploitation like a pro. Stack Exploitation seems pretty intense although it’s easy. In this post, we’ll solve all the stack challenges there are 6 stack exploitation challenges in Pheonix CTF. This is a series of stack exploitation challenges. Starting from Stack zero which is a memory overwriting challenge advances by each level. If you […]
This is a practical guide on a number of binary exploitation techniques, if you are a binary exploitation noob then this is the guide for you. ever wanted to learn about reverse engineering but didn’t because it was too hard? there was a lot of advanced material but not much for noobs. Say no more […]