Command Injection & SQL Injection | HackTheBox Looking glass & Sanitize | OWASP TOP 10
We covered Command Injection & SQL Injection which are in the OWASP TOP 10 list of vulnerabilities….
We covered Command Injection & SQL Injection which are in the OWASP TOP 10 list of vulnerabilities….
We covered broken authentication, session hijacking and information disclosure as part of HTB OWASP TOP 10 track…
We covered a simple demonstration of XML External Entity Injection vulnerability which is part of OWASP Top…
We covered a demo of XML External Entity Injection along with privilege escalation through exploiting Python eval…
We covered HackTheBox Remote machine as part of CREST CRT (Registered Penetration Tester) Track. We demonstrated Umbraco…
We covered HackTheBox GoodGames as part of CREST CRT track. We went over SQL Injection, server side…
We covered HackTheBox Active as part of CREST CRT (registered penetration tester track). We went through Exploiting…
We covered Insecure Direct Object Reference vulnerability exploitation along with Python privilege escalation as part of HackTheBox…
We covered HackTheBox FriendZone as part of CREST CRT track. We went over DNS zone transfer, SMB…
We enumerate NFS shares, and upload a Web Shell . We also performed Linux privilege escalation by…
We covered a scenario of a vulnerable Microsoft IIS web server which was leveraged to compromise a…
We covered again printer exploitation methods and this time we used a machine that has printer installed…
We covered a scenario of buffer overflow where a variable was declared as an unsigned integer and…
We covered a binary that has only PIE or Position Independent Executable enabled as a protection while…
We covered a machine with a printer exposed to the public via port 80. The printer contained…
We covered a scenario of a binary vulnerable to buffer overflow vulnerability. The binary has NX and…
We covered a printer exploitation scenario where we started with telnet protocol then we used SNMP to…
We covered a scenario of gaining access to a windows server machine with vulnerable printer software. We…
Introduction We covered a difficult scenario of printer exploitation. We first interacted with the printer HP JetDirect…
In this post, I have covered HackTheBox Cyber Apocalypse CTF 2023 Writeups in the form of written…