Mac LeoHackTheBox | Sherlocks | BrutusAnalyzing the auth.log, can you identify the IP address used by the attacker to carry out a brute force attack?Aug 11Aug 11
Mac LeoHackTheBox | Sherlocks | Campfire 21.When did the ASREP Roasting attack occur, and when did the attacker request the Kerberos ticket for the vulnerable user?Jul 24Jul 24
Mac LeoHackTheBox | Sherlocks | Campfire 1Analyzing Domain Controller Security Logs, can you confirm the date & time when the kerberoasting activity occurred?Jul 14Jul 14
Mac LeoWeb Security Academy by PortSwigger | Cross-Site Scripting (XSS)Lab 1: Reflected XSS into HTML context with nothing encodedMay 11, 2023May 11, 2023
Mac LeoWeb Security Academy by PortSwigger | SQL InjectionLab 1: SQL injection vulnerability in WHERE clause allowing retrieval of hidden dataMar 15, 2023Mar 15, 2023
Mac LeoTryHackMe: Advent of Cyber 3 (2021)TryHackMe: [Day 1] Web Exploitation Save The GiftsMay 14, 2022May 14, 2022
Mac LeoTryHackMe: [Day 24] Post Exploitation Learning From The GrinchWhat is the username of the other user on the system?May 9, 2022May 9, 2022
Mac LeoTryHackMe: [Day 23] Blue Teaming PowershELlF MagicWhat command was executed as Elf McNealy to add a new user to the machine?May 6, 2022May 6, 2022
Mac LeoTryHackMe: [Day 22] Blue Teaming How It HappenedWhat is the username (email address of Grinch Enterprises) from the decoded script?May 5, 2022May 5, 2022