Linux Privilege Escalation Through X11 Authorization | HackTheBox Squashed
We enumerate NFS shares, and upload a Web Shell . We also performed Linux privilege escalation by…
We enumerate NFS shares, and upload a Web Shell . We also performed Linux privilege escalation by…
We covered a scenario of a vulnerable Microsoft IIS web server which was leveraged to compromise a…
We covered again printer exploitation methods and this time we used a machine that has printer installed…
We covered a scenario of buffer overflow where a variable was declared as an unsigned integer and…
We covered a binary that has only PIE or Position Independent Executable enabled as a protection while…
We covered a machine with a printer exposed to the public via port 80. The printer contained…
We covered a scenario of a binary vulnerable to buffer overflow vulnerability. The binary has NX and…
We covered a printer exploitation scenario where we started with telnet protocol then we used SNMP to…
We covered a scenario of gaining access to a windows server machine with vulnerable printer software. We…
Introduction We covered a difficult scenario of printer exploitation. We first interacted with the printer HP JetDirect…
In this post, I have covered HackTheBox Cyber Apocalypse CTF 2023 Writeups in the form of written…
Summary In this post, we covered the basic steps to take in order to analyze a binary…
Pentesting Windows Active Directory with BloodHound | HackTheBox Forest | CREST CRT Track We covered HTB Forest…
Mounting VHD Files and Windows Privilege Escalation | HackTheBox Bastion | CREST CRT Track HackTheBox Bastion was…
Windows Privilege Escalation Through Runas | HackTheBox Access | CREST CRT Track HackTheBox Access was a simple…
HackTheBox Squashed Walkthrough | Linux Privilege Escalation Through X11 Authorization |CREST CRT Track Squashed uses a few…
In this post, we covered HackTheBox Jerry as part of the beginner track in Hackthebox. We demonstrated…
In this post, we covered the eternal blue exploit as part of HackTheBox Beginner Track. Machine Name…
Introduction One of our web servers triggered an AV alert, but none of the sysadmins say they…
In this post, we go over the concept of retrieving shell via ICMP protocol instead of TCP….