Hack The Box: Sau Write-Up
Sau was my first active easy-rated machine that I was able to pwn on HackTheBox. It was quite challenging because it combined several vulnerabilities that need to be exploited to get the flags. For...
Sau was my first active easy-rated machine that I was able to pwn on HackTheBox. It was quite challenging because it combined several vulnerabilities that need to be exploited to get the flags. For...
Optimum is an easy-rated Windows machine that is vulnerable to at least one publicly known vulnerability. We will do the complete process, from enumeration to privilege escalation, from within the ...
Legacy is an easy-rated Windows machine. Enumeration Let’s start by using a basic nmap scan. $ nmap -sC -sV 10.10.10.4 -oA scans/basic_scan # Nmap 7.94SVN scan initiated Thu Dec 21 15:14:39 2023...
Recently, I learned how to configure the look of the zsh terminal on macOS and was stunned with how many options there are. Since the Powerlevel10k theme is my favorite so far, I will show you how ...
While doing the NFS section of HTB Academy’s Footprinting module, I encountered a problem when trying to mount the remote NFS share. $ sudo mount -t nfs 10.129.202.5:/var/nfs ./nfs-target/ -o nolo...
Jerry is an easy-rated Windows machine on HTB that can teach you some basics of proper enumeration, searching for exploits on the Internet, and brute-forcing valid credentials for protected pages. ...
As I am still new in the world of cybersecurity and penetration testing, I want to document my progress on my learning. I will be starting with this write-up of the Lame machine on HackTheBox, show...
Filtering sequences, like lists, is a common task for developers. However, the code can become verbose and challenging to read, depending on the complexity of the filtering conditions. In this arti...