Rootkit Analysis to Privilege Escalation | TryHackMe Athena
We covered the boot2root challenge Athena from TryHackMe. We scanned the machine with Nmap and discovered SMB server from…
We covered the boot2root challenge Athena from TryHackMe. We scanned the machine with Nmap and discovered SMB server from…
We covered secure network architecture design concepts such as VLANs, security zones, access control lists, DNS snooping and ARP…
We covered an introduction to blockchain penetration testing by taking on a blockchain challenge from HackTheBox where we were…
We covered a boot to root machine where we started with an Nmap scan to discover several open ports…
We covered risk management process and its components and frameworks. We explained the different steps taken to undertake risk…
We covered and explained CVE-2023-4911 Looney Tunables that affects mostly all Linux distributions and allows an attacker to escalate…
We covered three of the most common Linux persistence techniques such as writing commands in .bashrc file, scheduled tasks…
We covered Insecure Direct Object Reference vulnerability exploitation along with Python privilege escalation as part of HackTheBox Cap CREST…
We covered HackTheBox FriendZone as part of CREST CRT track. We went over DNS zone transfer, SMB enumeration and…
We enumerate NFS shares, and upload a Web Shell . We also performed Linux privilege escalation by getting an…