Buffer Overflow | Intro to Binary Exploitation | HackTheBox Jeeves
We covered a scenario of a binary vulnerable to buffer overflow vulnerability. The binary has NX and…
We covered a scenario of a binary vulnerable to buffer overflow vulnerability. The binary has NX and…
We covered a printer exploitation scenario where we started with telnet protocol then we used SNMP to…
We covered a scenario of gaining access to a windows server machine with vulnerable printer software. We…
Introduction We covered a difficult scenario of printer exploitation. We first interacted with the printer HP JetDirect…
In this post, I have covered HackTheBox Cyber Apocalypse CTF 2023 Writeups in the form of written…
Summary In this post, we covered the basic steps to take in order to analyze a binary…
Pentesting Windows Active Directory with BloodHound | HackTheBox Forest | CREST CRT Track We covered HTB Forest…
Mounting VHD Files and Windows Privilege Escalation | HackTheBox Bastion | CREST CRT Track HackTheBox Bastion was…
Windows Privilege Escalation Through Runas | HackTheBox Access | CREST CRT Track HackTheBox Access was a simple…
HackTheBox Squashed Walkthrough | Linux Privilege Escalation Through X11 Authorization |CREST CRT Track Squashed uses a few…
In this post, we covered HackTheBox Jerry as part of the beginner track in Hackthebox. We demonstrated…
In this post, we covered the eternal blue exploit as part of HackTheBox Beginner Track. Machine Name…
Introduction One of our web servers triggered an AV alert, but none of the sysadmins say they…
In this post, we go over the concept of retrieving shell via ICMP protocol instead of TCP….
In this post, we demonstrated how to exploit SSRF to discover internal hidden services. We performed privilege…
Shellshock vulnerability allows for remote code execution using shell callouts to bash below 4.3. payload can be…
In Windows active directory environment, PAC stands for privilege attribute certificate which stores information about the user…
Premise In this video walkthrough, we covered a vulnerability in Jackson library that uses JSON Deserialization and…
Premise In this video walkthrough, we demonstrated common vulnerabilities in Lua programming including code injection, and performed…