UserNamesTryHackMe Writeup — Day 2: One man’s false positive is another man’s potpourri.It’s the most wonderful time of the year again, and it’s also the most stressful day for Wareville’s Security Operations Center (SOC) team…15h ago
Vishal KumarChemistry HTB (writeup)The objective is to enumerate a Linux-based machine named “Chemistry” and exploit a specific Common Vulnerability and Exposure (CVE).Nov 29
Rafi AdityaWrite-Up CTF Hacktrace Ranges PhishHuntYou can access this challenge through the following link: https://www.hacktrace-ranges.id/list_challenges/view/phishhunt1d ago1d ago
Ali ZaminiHackTheBox Challenge Write-Up: InstantThis HackTheBox challenge, “Instant”, involved exploiting multiple vectors, from initial recon on the network to reverse engineering a…Nov 101Nov 101
Daniel - Life of a PentesterXXE Injection — TryHackMeWhile participating in the CyberAdvent 2024 from tryhackme, and completing one of their rooms, at the end I stumble upon a side exercise…1d ago1d ago
UserNamesTryHackMe Writeup — Day 2: One man’s false positive is another man’s potpourri.It’s the most wonderful time of the year again, and it’s also the most stressful day for Wareville’s Security Operations Center (SOC) team…15h ago
Vishal KumarChemistry HTB (writeup)The objective is to enumerate a Linux-based machine named “Chemistry” and exploit a specific Common Vulnerability and Exposure (CVE).Nov 29
Rafi AdityaWrite-Up CTF Hacktrace Ranges PhishHuntYou can access this challenge through the following link: https://www.hacktrace-ranges.id/list_challenges/view/phishhunt1d ago
Ali ZaminiHackTheBox Challenge Write-Up: InstantThis HackTheBox challenge, “Instant”, involved exploiting multiple vectors, from initial recon on the network to reverse engineering a…Nov 101
Daniel - Life of a PentesterXXE Injection — TryHackMeWhile participating in the CyberAdvent 2024 from tryhackme, and completing one of their rooms, at the end I stumble upon a side exercise…1d ago
amshiJohn The Ripper| tryhackme walkthroughN.B: You would have to first identify what type of hash it is then insert the type in the format part of the command & to identify the hash…Jan 31
DaltaPicoCTF2022 | Binary EXP | RPSThis challenge is great to a beginner who approaches the world of Binary Exploitation.2d ago
InInfoSec Write-upsby0verlo0kedLookup THM WalkthroughTest your enumeration skills on this boot-to-root machine.Nov 232