<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Rindaman666 on Medium]]></title>
        <description><![CDATA[Stories by Rindaman666 on Medium]]></description>
        <link>https://medium.com/@Rindaman666?source=rss-faec011409bd------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*Iwvb3PcsrHNzbD17p0h0Kw.jpeg</url>
            <title>Stories by Rindaman666 on Medium</title>
            <link>https://medium.com/@Rindaman666?source=rss-faec011409bd------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Tue, 19 May 2026 12:49:31 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@Rindaman666/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[TryHackMe : Server-side Template Injection Task 8]]></title>
            <link>https://medium.com/@Rindaman666/tryhackme-server-side-template-injection-task-8-37c47a77d24f?source=rss-faec011409bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/37c47a77d24f</guid>
            <category><![CDATA[learning]]></category>
            <category><![CDATA[data-science]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[tryhackme]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Rindaman666]]></dc:creator>
            <pubDate>Tue, 19 May 2026 04:15:33 GMT</pubDate>
            <atom:updated>2026-05-19T04:15:33.792Z</atom:updated>
            <content:encoded><![CDATA[<p>Exploit various templating engines that lead to SSTI vulnerability.</p><blockquote><strong>I’m currently starting my journey in cybersecurity. Since I’m still learning, please feel free to point out any mistakes or share your advice. I’d really appreciate it!</strong></blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/972/1*x4Gjrjqj5oZNPUZVlxeFsA.png" /></figure><p>Task 8 : Extra-Mile Challenge</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*9YKDebLuy6XngnpAeBikyQ.png" /></figure><ol><li>Login and Create Internal Form.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*FGwEmv0bQqmbl1Ia0i9vzg.png" /></figure><p>2. Create any name.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*UHjWDyJUFjRD54ETB3ebYw.png" /></figure><p>3. Once completed, it will look like this.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*IIHt9yWye6tPz9ZaoLqWBg.png" /></figure><p>4. Try use Template Engines from exercise.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/942/1*IjF7MtVdqYUF9M7qU9pO7Q.png" /><figcaption>PHP-Smarty</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/950/1*_5BN0g8iLNN_L9qTqZ-wNg.png" /></figure><p>5. Use ls to find hidden text file in the server.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/903/1*DsDkmEt5lxRLvwSahUb2yQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/926/1*Pvhm94nT3EIvpkWk7UFWhQ.png" /></figure><p>6. Use cat to read file we find.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/918/1*sVuUqorNcLl2MtgZQzdVkw.png" /></figure><p>7. Finish</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/907/1*pvpX7Srrf_AW7HMqok61NQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*fcXiw90BX6P2kMbjGZERgA.png" /></figure><p><a href="https://tryhackme.com/room/serversidetemplateinjection?utm_campaign=social_share&amp;utm_medium=social&amp;utm_content=share-completed-room&amp;utm_source=copy&amp;sharerId=62b57bb829e1540043b70632">https://tryhackme.com/room/serversidetemplateinjection?utm_campaign=social_share&amp;utm_medium=social&amp;utm_content=share-completed-room&amp;utm_source=copy&amp;sharerId=62b57bb829e1540043b70632</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=37c47a77d24f" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[TryHackMe: Hammer]]></title>
            <link>https://medium.com/@Rindaman666/tryhackme-hammer-e73377983faf?source=rss-faec011409bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/e73377983faf</guid>
            <category><![CDATA[technology]]></category>
            <category><![CDATA[learning]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[tryhackme]]></category>
            <dc:creator><![CDATA[Rindaman666]]></dc:creator>
            <pubDate>Sat, 09 May 2026 09:35:46 GMT</pubDate>
            <atom:updated>2026-05-09T09:35:46.072Z</atom:updated>
            <content:encoded><![CDATA[<p>Use your exploitation skills to bypass authentication mechanisms on a website and get RCE.</p><blockquote><strong><em>“I’m currently starting my journey in cybersecurity. Since I’m still learning, please feel free to point out any mistakes or share your advice. I’d really appreciate it!”</em></strong></blockquote><ol><li>I used Nmap to scan for open ports.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/814/1*jGMiQbJ5ageJCBz84J7CWA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*OBix1Md0K29BM-U0ifUNeA.png" /></figure><p>2. I proceeded to investigate the identified ports.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*umC1-BQBbgc4LxTqqoviAw.png" /></figure><p>3. I checked the source code for vulnerabilities and discovered a comment tag: &lt;!-- hmr_dir… — !&gt;</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/582/1*XV1Jl9ODYDxYKsIyxgdqgQ.png" /></figure><p>4. Then, I used ffuf to perform directory brute-forcing, using “hmr_” as a prefix.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*5lozncEQxCfGH3To2yK6tQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/711/1*IAVRp_cV1VNVuYwba1hPHg.png" /></figure><p>5. I accessed a suspicious directory hmr_logs/error.logs and found a username, which served as a clue for the next step.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*nSonar2-QodSHUZIXqBUjQ.png" /></figure><p>6. After clicking “Forgot Password,” I was redirected to reset_password.php.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*xY2FE6eW2fZ5erO9Xh-2RQ.png" /></figure><p>7. The page had a 180-second timeout and required a 4-digit PIN.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*fBqKRvhCKKIdZpgfWrub7A.png" /></figure><p>8. I used ffuf to brute-force the PIN while carefully avoiding the rate limit.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*EelnQUfgwnfxKc01Y-WgAA.png" /><figcaption>Ex. 4-Digit Code is 9405</figcaption></figure><p>9. I was then able to reset the password.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Ed03IvYvuA6MorVfDjEjmg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*xY2FE6eW2fZ5erO9Xh-2RQ.png" /></figure><p>10. I successfully captured the first flag.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_Lb2J4RiBMINHRYuIPiDaw.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*-yt63Ckc3FaOfO1qIH-cyA.png" /></figure><p>11. I used Burp Suite to intercept requests/responses and executed the ls command to list files in the directory.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*uZnt9JqqVtP2rxl3Fn5Kdg.png" /></figure><p>12. I modified the token by changing “kid” to 188ade1.key, &quot;role&quot; to admin, and setting persistentSession to yes.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*GULUjAU-ibOE7iK64NxEtQ.png" /></figure><p>13. I used the 188ade1.key file as the signing secret for the token.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*PL_KVWXpkXWemiQVVUWqHg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/906/1*tuDVKOf92tO_MTmrNw4UGA.png" /></figure><p>14. Finally, I retrieved the last flag.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*x8RIDlQQe0-TWsQEAWtuig.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*btM1bmIpO8jWUu2oTilfUA.png" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e73377983faf" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[TryHackMe : Splunk: Exploring SPL]]></title>
            <link>https://medium.com/@Rindaman666/tryhackme-splunk-exploring-spl-92417e75514a?source=rss-faec011409bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/92417e75514a</guid>
            <category><![CDATA[tryhackme-walkthrough]]></category>
            <category><![CDATA[splunk]]></category>
            <category><![CDATA[blue-team]]></category>
            <category><![CDATA[tryhackme]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Rindaman666]]></dc:creator>
            <pubDate>Mon, 06 Oct 2025 08:08:53 GMT</pubDate>
            <atom:updated>2025-10-06T08:08:53.565Z</atom:updated>
            <content:encoded><![CDATA[<h3>TryHackMe : Splunk: Exploring SPL</h3><p>Walkthrough of TryHackMe’s Splunk: Exploring SPL room — step-by-step guide with SPL examples and screenshots</p><h4><a href="https://tryhackme.com/room/splunkexploringspl?sharerId=62b57bb829e1540043b70632">https://tryhackme.com/room/splunkexploringspl?sharerId=62b57bb829e1540043b70632</a></h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/257/0*HD6LEhXNFhFBnzom.png" /></figure><p><strong># Q : What is the name of the host in the Data Summary tab?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yLyjxweb55dMe8qvwwy1ug.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Mrty2jpXj7DcaOHLH-gW0A.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/737/1*oI7xDyhDBoFkdWdiKf-E_w.png" /></figure><p><strong># Q : In the search History, what is the 7th search query in the list? (excluding your searches from today)</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*b5ncomVZdGUlyZK07D5EaA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*6bFvgwrOPjWsZw__HgbJZQ.png" /></figure><p><strong># Q : In the left field panel, which Source IP has recorded max events?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*BSlcj9r-DjDTHjJU2vrgQw.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/759/1*OK4J7XqpJJaLcwQ9Qux1Sg.png" /></figure><p><strong># Q : How many events are returned when we apply the time filter to display events on 04/15/2022 and Time from 08:05 AM to 08:06 AM?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*LRrVIUwEe5v3bPR42zIrEA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/754/1*zKHBTf08BTTp-Xxwmx6pog.png" /></figure><p><strong># Q : How many Events are returned when searching for Event ID 1 AND User as *James*?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_BB8rb3SYuWlaufs9gDkxg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/772/1*P09vZ4laSGwbfrXFa5qT-w.png" /></figure><p><strong># Q : How many events are observed with Destination IP 172.18.39.6 AND destination Port 135?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*2hXJOodHtNQ6zMdAOsQNUQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/592/1*AizUzem5ngR3gC7eEQr_4g.png" /></figure><p><strong># Q : What is the Source IP with highest count returned with this Search query?<br>Search Query: index=windowslogs Hostname=”Salena.Adam” DestinationIp=”172.18.38.5&quot;</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*BQJNaMaGT1UhZyhbsWwU5A.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/761/1*O8GR9slbDh5VV9jMBhRv_g.png" /></figure><p><strong># Q : In the index windowslogs, search for all the events that contain the term cyber how many events returned?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Ydjxl8xG7HaxgNUFNITiuA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/629/1*y5Mc5rLZf0yVoq7uFyU7Jw.png" /></figure><p><strong># Q : Now search for the term cyber*, how many events are returned?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yOcNBO706PAMmC6kPYZh8w.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/675/1*u0tYPtCI_JTLVNZnBd9Hjg.png" /></figure><p><strong># Q : What is the third EventID returned against this search query?</strong></p><p><strong>Search Query: </strong><strong>index=windowslogs | table _time EventID Hostname SourceName | reverse</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*2MIWDCQhNyy_r1lpoEN0vQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*qDqMTbIRiTSkGykogryYnQ.png" /></figure><p><strong># Q : Use the dedup command against the Hostname field before the reverse command in the query mentioned in Question 1. What is the first username returned in the Hostname field?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*tLfdmofIjhyOE1Xs-oXO1g.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*V57v0GMSAx-lzGIIJ_eWDw.png" /></figure><p><strong># Q : Using the Reverse command with the search query index=windowslogs | table _time EventID Hostname SourceName — what is the HostName that comes on top?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kfxtpyEg3E2QydxrD98OLA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*XdBw-0R268nAj0MRXrOUbg.png" /></figure><p><strong># Q : What is the last EventID returned when the query in question 1 is updated with the tail command?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*66p7U2fq5c__Pes50e1cVQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*B7MFTGx-Xg6ekb7TwN1jrA.png" /></figure><p><strong># Q : Sort the above query against the SourceName. What is the top SourceName returned?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*K0VbvpZYU9Qe2DnynlrBXA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*fDze2q3b3-4zTb-dVItyBA.png" /></figure><p><strong># Q : List the top 8 Image processes using the top command — what is the total count of the 6th Image?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*6xDrqorZRME8aHt4ky6umA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HkcBVDddpicINHQpuZtCQg.png" /></figure><p><strong># Q : Using the rare command, identify the user with the least number of activities captured?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*br0ms2MfOWTRqrSC5h1bLA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*CnD64EN3suR-wGVFT9jKVQ.png" /></figure><p><strong># Q : Create a pie-chart using the chart command — what is the count for the conhost.exe process?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Oy8TZHKlAANePttBbytFQg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*SA_JKUoGvbWfXCOUCSqZsA.png" /></figure><p>#tryhackme #splunk #SPL #cybersecurity #SIEM</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=92417e75514a" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Try Hack Me : Session Management -Task6]]></title>
            <link>https://medium.com/@Rindaman666/try-hack-me-session-management-task6-4ff3ace28ceb?source=rss-faec011409bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/4ff3ace28ceb</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[beginner]]></category>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[tryhackme]]></category>
            <category><![CDATA[information-security]]></category>
            <dc:creator><![CDATA[Rindaman666]]></dc:creator>
            <pubDate>Sat, 19 Jul 2025 16:00:24 GMT</pubDate>
            <atom:updated>2025-07-19T16:00:24.013Z</atom:updated>
            <content:encoded><![CDATA[<h3>Try Hack Me : Session Management -Task6</h3><p><a href="https://tryhackme.com/room/sessionmanagement">Session Management</a></p><p>Q : What is the username of the student with the name X?</p><p>A:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*iDtJ_Y-h6H4OfRG9Z4SRvg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/955/1*2NximEiPUBJRUWnkTRo76Q.png" /></figure><p>How To ?? // การได้มาของคำตอบ</p><ol><li>Look at Network Request. // คลิกที่แท็ปของ Network แล้วไล่ดูคำขอที่ส่งมา</li><li>We can see that requests were sent to three dashboards SuperAdmin/Student/Lecture. // จะเห็นได้ว่ามี 3 แดชบอร์ดที่ถูกส่งมา</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mYSRvYHAp86j4b7EqqGKUw.png" /></figure><p>3. Change userRole to Lecture. // เปลี่ยน userRole เป็น Lecture</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Cu7uOWMglYbRdZG2vlMAOg.png" /></figure><p>4. Find Answer. // คำตอบ</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*xEquv6YYJQUidbJttCl2vA.png" /></figure><p>Q : How many lecturers are registered on the application?</p><p>A :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kthwIvlJhXlhhEQAW-Wr0Q.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*RUAm448_Fz0nlTu6acAKng.png" /></figure><p>Q : Excluding the unauthenticated user, how many roles does the application have?</p><p>A :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zgfBgic23q84W8dTmO1s9Q.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mYSRvYHAp86j4b7EqqGKUw.png" /></figure><p>Q : How many test attempts in total have been performed on the application?</p><p>A :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Cpcwsx8pgWo_kUTPAU8dCw.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3Ldx9m7wHPUkKmzBabw6aA.png" /></figure><p>Q : What is the highest score that student1 has achieved on a test?</p><p>A :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*WkLK2fgPzwAKiJYBgXZdfw.png" /></figure><p>How To ??</p><ol><li>Go to ID 1.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_UfUCgfra1iTgSPWrvoEEw.png" /></figure><p>2. Answer.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3eHeNxs3NWpZsC0bmzo31A.png" /></figure><p>Q : What is the sequence of correct answers for the Database Types test? (Format y=yes and n=no, separated by commas)</p><p>A :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Z99D1EjC0JeQuzq86aOwig.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ROTSUctTUDRNsWVoYY0YDg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*EPA0l4Xp6iCuhrk27on6hw.png" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=4ff3ace28ceb" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[WriteUp TryHackMe | Pickle Rick]]></title>
            <link>https://medium.com/@Rindaman666/writeup-tryhackme-pickle-rick-a25ec32c3724?source=rss-faec011409bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/a25ec32c3724</guid>
            <category><![CDATA[beginner]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[redteam-tool]]></category>
            <category><![CDATA[tryhackme]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Rindaman666]]></dc:creator>
            <pubDate>Sun, 06 Jul 2025 15:45:20 GMT</pubDate>
            <atom:updated>2025-07-06T15:45:20.665Z</atom:updated>
            <content:encoded><![CDATA[<p><a href="https://tryhackme.com/room/picklerick">Pickle Rick</a></p><p><strong>What is the first ingredient that Rick needs?</strong></p><p><strong>A: mr. meeseek hair</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*C_X28-hXvcaAC0oV6zlZuQ.png" /></figure><p><strong>?? How To ??</strong></p><ol><li>I use Nmap first.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/754/1*bBK1wl1zeFNOONYWf8lvlw.png" /></figure><p>2. I use Gobuster to search for Infomation.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*He75uf7PllAWBKr5hGQDGw.png" /></figure><p>3. View page source.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/911/1*rVR7_GupX27FFUQ-4d_p3Q.png" /></figure><p>And</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/454/1*jzrTX9hw5XAj7OVKSLUayA.png" /></figure><p>4. Try to open the directory we found with Gobuster.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/672/1*NG1_1dw2H1C_uN5g9EOv8g.png" /></figure><p>5. And i think we found Username and Password.</p><p>6. Yes we can get in.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/998/1*AtUncAVYCT685G7us3n2SA.png" /></figure><p>7. Try ls</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/746/1*YUYMSvP9S8oBlzSYzcpbqw.png" /></figure><p>8. And try into first file</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/964/1*k9bsxO8l66uOCZ5cqFAZOA.png" /></figure><p>9. Done.</p><p><strong>What is the second ingredient in Rick’s potion?</strong></p><p>A: 1 jerry tear</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*t_WhWMQWC2XU0j73GXjZ9g.png" /></figure><p><strong>?? HOW TO ??</strong></p><ol><li>Check Sudo</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*n3KwPmSz8-a50LZyurH-FA.png" /></figure><p>2.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kUHoW4tqjYzvopOOQM8oKg.png" /></figure><p>3.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/486/1*qlX-UdUfMQT4i0isorxw0w.png" /></figure><p><strong>What is the last and final ingredient?</strong></p><p>A: fleeb juice</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*-YtZIQvXNP_CikWRhhMUNg.png" /></figure><p><strong>?? HOW TO ??</strong></p><p>1.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/407/1*LgjGKqzeX13pc3oksT3k9g.png" /></figure><p>2.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/485/1*lF7QAzibLgjuYHDIlXb8gQ.png" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a25ec32c3724" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Bounty Hacker : TryHackMe Write-Up]]></title>
            <link>https://medium.com/@Rindaman666/bounty-hacker-tryhackme-write-up-025a45fbb8b2?source=rss-faec011409bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/025a45fbb8b2</guid>
            <category><![CDATA[beginner]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[tryhackme-walkthrough]]></category>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[hacker]]></category>
            <dc:creator><![CDATA[Rindaman666]]></dc:creator>
            <pubDate>Fri, 06 Jun 2025 07:13:58 GMT</pubDate>
            <atom:updated>2025-06-06T07:13:58.011Z</atom:updated>
            <content:encoded><![CDATA[<h3>Bounty Hacker : TryHackMe Write-Up</h3><p><strong>Q: Find open ports on the machine?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/743/1*XmU7bmW2lRyx8Ys4fITAYg.png" /><figcaption>I use nmap first</figcaption></figure><p><strong>Q: Who wrote the task list?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/271/1*VgHrXi_7UY-tWW5X3YWIwQ.png" /><figcaption>Hint</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*4aJJj32i4p6k98ZNjI524g.png" /></figure><p>Login FTP By Name Anonumous</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/755/1*9NVxUrdt64ZFAxDATteArg.png" /></figure><p>I use command mget *.* for download allfiles</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/807/1*waCk27Y3hWtqsIjupXTqQw.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/469/1*9VBC2cwJcSiL4mVbCSKkpw.png" /></figure><p><strong>A: lin</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rVkrjAGm4kgHQc2YSC4xhQ.png" /></figure><p><strong>Q: What service can you bruteforce with the text file found?</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/305/1*y3SDgsQ_yILgpoAOmZmTWw.png" /><figcaption>Hint</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*8uUHOGujGrEL80fZNtJMjQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/498/1*O6zAn3NgUuKCL97yFon5oA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/883/1*YzW3tiu_5HMk3S7T6r009A.png" /></figure><p><strong>A: RedDr4gonSynd1cat3</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*1DvZcLpT6K9luSH3fd2vpA.png" /></figure><p><strong>Q: user.txt</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/787/1*v8Li0yhykJ0oMYqC3nULdA.png" /></figure><p><strong>A: THM{CR1M3_SyNd1C4T3}</strong></p><p><strong>Q: root.txt</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/675/1*A6ZIqgYououRDX3EA89zRg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*dw0wCPxl4vCvkx0bmQJgZw.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/809/1*yl3_MupblkYmutkPh6LRHg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/489/1*pY31hkhnbPMvIdOLgcRdIg.png" /></figure><p><strong>A: THM{80UN7Y_h4cK3r}</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*uHChP78anVX4sUaW8yS-Pw.png" /></figure><p><a href="https://tryhackme.com/room/cowboyhacker">https://tryhackme.com/room/cowboyhacker</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=025a45fbb8b2" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Flag Command : Hack The Box Writeup | By Rindaman666]]></title>
            <link>https://medium.com/@Rindaman666/flag-command-hack-the-box-writeup-by-rindaman666-490d67ed1456?source=rss-faec011409bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/490d67ed1456</guid>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[learning]]></category>
            <category><![CDATA[ctf-writeup]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[hackthebox]]></category>
            <dc:creator><![CDATA[Rindaman666]]></dc:creator>
            <pubDate>Wed, 07 May 2025 12:00:59 GMT</pubDate>
            <atom:updated>2025-06-02T14:50:14.643Z</atom:updated>
            <content:encoded><![CDATA[<h3>Flag Command : Hack The Box Writeup | By Rindaman666</h3><p>When you open the link, you will see this website.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*GfT60twuT3kqrcLWHvw7BA.png" /></figure><p>2. Click Inspect for see all data.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*dG8IVzRjYA6qU7N4YFW2Yg.png" /></figure><p>3. It looks like there’s nothing we need.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*l-vOpwxf30O9r-oSW38mOA.png" /></figure><p>4. Click Network</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*5JEftoCvqLpjwu5F6y_KWA.png" /></figure><p>5. When I saw all the files, the one named ‘option’ seemed interesting because it had the word ‘secret’ in it.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/510/1*qVlI-o8ODj_XB1QCpeLioQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/474/1*hWDfr24HXxvnB9NQUALfPA.png" /></figure><p>6. When I type the data form ‘secret’, we will find the flag.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*iR2l2zxQ40vs3L2tilhSYQ.png" /></figure><p><a href="https://www.hackthebox.com/achievement/challenge/1414440/646">https://www.hackthebox.com/achievement/challenge/1414440/646</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=490d67ed1456" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Binwalk Challenge Easy : CTFLearn]]></title>
            <link>https://medium.com/@Rindaman666/binwalk-challenge-easy-ctflearn-f1cdebaf5911?source=rss-faec011409bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/f1cdebaf5911</guid>
            <category><![CDATA[ctf]]></category>
            <category><![CDATA[learning]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[blue-team]]></category>
            <dc:creator><![CDATA[Rindaman666]]></dc:creator>
            <pubDate>Tue, 06 May 2025 16:07:54 GMT</pubDate>
            <atom:updated>2025-05-06T16:07:54.490Z</atom:updated>
            <content:encoded><![CDATA[<h3><strong>Binwalk C</strong>hallenge Easy : CTFLearn</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/798/1*b-YHPsVydh9rybMZObnIRg.png" /><figcaption>โจทย์</figcaption></figure><ol><li>ใช้ chat gpt ในการช่วยหาคำตอบ</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/780/1*Bf38FaO1cYfpi2aMcVtAFw.png" /></figure><p>2. ใช้ binwalk</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Keq0n1jIr6LWEiWhYhaztw.png" /></figure><p>จากภาพแสดงว่ามีไฟล์ซ่อนอยู่ 3 ไฟล์</p><p>3. ใช้คำสั่ง -e เพื่อแตกไฟล์ที่ซ่อนอยู่</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/497/1*4WN7UhNNPsLUmDIZPOOPHA.png" /></figure><p>4. ไฟล์ที่แตกออกมาจะได้นามสกุล โฟเดอร์.extracted</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/673/1*hGqYDFxLXymtns-a74kkSw.png" /></figure><p>5. ภายในโฟเดอร์.extracted</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/917/1*h6XAxKPafGf3udyV1otbEw.png" /></figure><p>6. ละไฟล์รูปอยู่ไหน ?? ถาม Chat GPT ต่อ</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/926/1*ujrDptMFvKQKr9c5utzo8w.png" /></figure><p>7. ใช้คำสั่ง binwalk -D ‘image:png’ [ชื่อไฟล์ที่โหลดมา] เพื่อแยกไฟล์รูปออกมา</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/605/1*t7gesqQYr5O26zhuQZ_LWQ.png" /></figure><p>8. ได้ไฟล์รูปแล้ว</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/899/1*HWJsX3FRnWafyLSsBo8c7A.png" /></figure><p>9. flag</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/802/1*79ROla2FmisB8u2pJ4D59g.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/802/1*2apFrqI5bvx7op_32L4i3Q.png" /></figure><p><a href="https://ctflearn.com/challenge/108">https://ctflearn.com/challenge/108</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f1cdebaf5911" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Exif Challenge EasyWriteup : ctflearn]]></title>
            <link>https://medium.com/@Rindaman666/exif-challenge-easywriteup-ctflearn-f178aec39b18?source=rss-faec011409bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/f178aec39b18</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[learning]]></category>
            <category><![CDATA[ctf-writeup]]></category>
            <category><![CDATA[forensics]]></category>
            <category><![CDATA[blue-team]]></category>
            <dc:creator><![CDATA[Rindaman666]]></dc:creator>
            <pubDate>Tue, 06 May 2025 14:00:05 GMT</pubDate>
            <atom:updated>2025-06-02T14:48:55.847Z</atom:updated>
            <content:encoded><![CDATA[<h3><strong>Exif C</strong>hallenge <strong>Easy Writeup : </strong>CTFlearn</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*L9i48GaQu6HzcekVtmENXg.png" /><figcaption>โจทย์</figcaption></figure><ol><li>ผมจะใช้ Chat GPT ในการช่วยหาคำตอบ</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/931/1*P2_Z7_Gr4rU2esVPCf05Cg.png" /><figcaption>1.1 ผลลัพท์การค้นหาจาก chat gpt</figcaption></figure><p>2. ผมเลือกใช้ exiftool ในการหาคำตอบ</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*DrciF-Zc4b9HvsB4Y6AJwA.png" /><figcaption>2.1 ผลลัพท์การใช้ exiftool</figcaption></figure><p>3. เจอ flag</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/948/1*MCvLS7YbQvU9Rmk3gW_UGw.png" /><figcaption>3.1 flag</figcaption></figure><p>4. เสร็จสิ้น</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/805/1*sFGvzsYsOxTSilhpBC08Lg.png" /></figure><blockquote><a href="https://ctflearn.com/challenge/303">https://ctflearn.com/challenge/303</a></blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f178aec39b18" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Write up Hack The Box: Takedown | By Rindaman666]]></title>
            <link>https://medium.com/@Rindaman666/write-up-hack-the-box-takedown-by-rindaman666-ce80ca7e5270?source=rss-faec011409bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/ce80ca7e5270</guid>
            <category><![CDATA[hackthebox]]></category>
            <category><![CDATA[hack-the-box-writeup]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[takedown]]></category>
            <dc:creator><![CDATA[Rindaman666]]></dc:creator>
            <pubDate>Wed, 13 Nov 2024 14:29:56 GMT</pubDate>
            <atom:updated>2024-11-13T14:29:56.611Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*x6g1fHyn78-1ionFVDL-6g.png" /></figure><p><strong>From what domain is the VBS script downloaded?</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*0vblRxc6opIvV3y4UWKXWg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*OgakRiIRGNEu295iITrybA.png" /></figure><p><strong>What was the IP address associated with the domain in question #1 used for this attack?</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ONprWFATpI8QPCmfdnRJew.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*i2dk13NO8ZrxP123FlThvQ.png" /></figure><p><strong>What is the filename of the VBS script used for initial access?</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VHUBo2NMwP8OGGjc9qyhhA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/871/1*liimGXwSIZ5EBJYHMz-qFg.png" /></figure><p><strong>What was the URL used to get a PowerShell script?</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*R01xf6c9FOFha8YaVs2d9w.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*EdEWj1MzE7X9i98Zm0dHqw.png" /></figure><p><strong>What likely legit binary was downloaded to the victim machine?</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wex67evF9Cjljc1eaBzUQA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Q9Yh3HtS13BP5ODP5AaG5Q.png" /></figure><p><strong>From what URL was the malware used with the binary from question #5 downloaded?</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*-rLw7FCOElXey9HU0gciuA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rOgDjpuz-Ti7NpxrOvd65w.png" /></figure><p><strong>What filename was the malware from question #6 given on disk?</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HQHMwEl8ZQ26pxa8DDar7w.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/439/1*Y-5Uj4Gll8XT1MKx9vbcFg.png" /></figure><p><strong>What is the TLSH of the malware?</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*0RuC37-hwQ7aedfY013aow.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kkzpC5e1Ie5GN93QgVyCng.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*lhhH741KuJS0el6X-V2rIQ.png" /></figure><p><strong>What is the name given to this malware? Use the name used by McAfee, Ikarus, and alejandro.sanchez.</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*jWtMEhfVkLtK1Ni4SZV1Rg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/628/1*uCMjEunlNVf2i0D6B-sBqQ.png" /></figure><p><strong>What is the user-agent string of the infected machine?</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*r5xUl03dsuJ6hqqCKmSF7Q.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*TjQhzpYTPBsVix_0MIHdHg.png" /></figure><p><strong>To what IP does the RAT from the previous question connect?</strong></p><p>Ans:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rgRRrw_0gcgHkYKYHbO3AQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ALy4GPS1wZN6B8Vm5Bvbjw.png" /></figure><h4><a href="https://labs.hackthebox.com/achievement/sherlock/1414440/761">https://labs.hackthebox.com/achievement/sherlock/1414440/761</a></h4><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ce80ca7e5270" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>