HackTheBox Unrested Writeup
Introduction HackTheBox Unrested is a medium-difficulty Linux machine running a version of Zabbix. Through enumeration, it is…
Introduction HackTheBox Unrested is a medium-difficulty Linux machine running a version of Zabbix. Through enumeration, it is…
In this post walk-through, we covered the first part of obfuscation techniques and principles for signature and…
The post is a detailed walkthrough of a TryHackMe challenge called “The Sticker Shop,” which explores Cross-Site…
In this post, I will be writing the second part of TryHackMe Advent of Cyber 2024 Full…
In this post, I will be solving and providing walkthrough and answers for Advent of Cyber 2024…
We covered the basics and fundamentals of reverse engineering using an example room from tryhackme. The post…
Introduction HackTheBox Brutus is a beginner-level DFIR challenge that includes an auth.log file and a wtmp file…
Introduction This post provides a comprehensive walkthrough of the HTB Lantern machine , detailing the steps taken…
This post provides a comprehensive introduction to PowerShell, a Microsoft-developed task automation and configuration management framework. It…
The post provides an in-depth walkthrough of exploiting and enumerating MySQL Services as part of a penetration…
Introduction In this walkthrough, we explore the “Crane” machine from OffSec’s Proving Grounds. This walkthrough demonstrates the…
Introduction The “SpookyPass” challenge from Hack The Box’s Hack The Boo 2024 event is a reverse engineering…
Introduction In HackTheBox PermX, we explore the Permx machine from Hack The Box (HTB), focusing on exploiting…
The Windows API enables direct interaction with core components of the Windows operating system, making it a…
The post provides a detailed walkthrough of using Volatility, a forensic analysis tool, to investigate a memory…
This post focuses on bypassing file upload filters to exploit vulnerabilities in web applications. It demonstrates techniques…
The post provides an in-depth walkthrough of a TryHackMe room focused on Linux Strength Training, targeting beginner…
Introduction In this post, we covered Python programming basics for penetration testers and cyber security specialists. We…
Introduction HackTheBox Abyss challenge is categorized as an Easy-level pwn challenge that revolves around exploiting a custom…
Introduction In HackTheBox No Gadgets ,we have a classic buffer overflow but with a unique twist: commonly…