Open in app

Sign In

Write

Sign In

Florian Kamps
Florian Kamps

10 Followers

Home

About

Dec 4, 2022

Throwback on the Log4Shell vulnerability

On November 24 2021, Chen Zhaojun of Alibaba Cloud’s security team privately disclose to the Apache Software Foundation a zero-day vulnerability in Log4j (which is one of their projects) named Log4Shell by Free Wortley of the LunaSec team. The vulnerability had existed unnoticed since 2013 and Apache gave Log4Shell a…

Hacking

5 min read

Throwback on the Log4Shell vulnerability
Throwback on the Log4Shell vulnerability
Hacking

5 min read


Sep 3, 2022

How I use Pwncat to reverse shell & privesc

When setting up a reverse shell or digging into the target machine to find a privilege escalation, the commands to communicate between our machine and the target machine can become long and tedious to type. This is where a program developed by Caleb Stewart comes into play: Pwncat Context My first…

Hacking

4 min read

How I use Pwncat to reverse shell & privesc
How I use Pwncat to reverse shell & privesc
Hacking

4 min read


Aug 23, 2022

Writeup — Wonderland

While browsing TryHackMe, I came across a particularly interesting room: Wonderland. This room is of medium difficulty and I will detail below the complete steps to get to the end of this room I will detail this room in several major steps: Enumeration 1st privilege escalation 2nd privilege escalation 3rd…

Tryhackme

5 min read

Writeup — Wonderland
Writeup — Wonderland
Tryhackme

5 min read


Aug 22, 2022

Writeup — RootMe using pwncat

In this Writeup, we will approach a room of easy difficulty: RootMe. This room is available on the TryHackMe platform. This Room is divided into 3 main parts: Reconnaissance Getting a shell Privilege Escalation Let’s begin by a network scan using nmap I’ll type nmap with some flags to display…

Tryhackme

4 min read

Writeup — RootMe
Writeup — RootMe
Tryhackme

4 min read


Aug 22, 2022

Writeup — Confidential

this is a quick writeup, explaining how we can extract the flag from Confidential Room on TryHackMe. For this room, TryHackMe gives us a direct access to the target machine with a graphical environment. Let’s start the machine and go to the folder that interests us: /home/ubuntu/confidential

Tryhackme Writeup

2 min read

Writeup — Confidential
Writeup — Confidential
Tryhackme Writeup

2 min read

Writeup — Confidential

this is a quick writeup, explaining how we can extract the flag from Confidential Room on TryHackMe.

For this room, TryHackMe gives us a direct access to the target machine with a graphical environment. Let’s start the machine and go to the folder that interests us: /home/ubuntu/confidential

--

--

Florian Kamps

Florian Kamps

10 Followers

Developer by day, hacker by night

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech