Metasploit - Write-up - TryHackMe
Information Room# Name: Metasploit Profile: tryhackme.com Difficulty: Easy OS: Windows Description: Part of the Red Primer series, learn to use Metasploit! Write-up Overview# Install tools used in
Information Room# Name: Metasploit Profile: tryhackme.com Difficulty: Easy OS: Windows Description: Part of the Red Primer series, learn to use Metasploit! Write-up Overview# Install tools used in
Information Box# Name: Magic Profile: www.hackthebox.eu Difficulty: Medium OS: Linux Points: 30 Write-up Overview# TL;DR: SQLi, webshell upload with bypass, EoP via SUID tool using unsecured PATH.
Information Room# Name: Blue Profile: tryhackme.com Difficulty: Easy OS: Windows Description: Deploy & hack into a Windows machine, leveraging common misconfigurations issues. Write-up Overview
Information Box# Name: Traceback Profile: www.hackthebox.eu Difficulty: Easy OS: Linux Points: 20 Write-up Overview# TL;DR: finding & abusing a PHP webshell to get system access, then EoP to an
Information Box# Name: Fatty Profile: www.hackthebox.eu Difficulty: Insane OS: Linux Points: 50 Write-up Overview# TL;DR: Java code review, bytecode JAR modification; exploit deserialization. Insta
Information# Box# Name: Oouch Profile: www.hackthebox.eu Difficulty: Hard OS: Linux Points: 40 Write-up# Overview# TL;DR: The 1st part is a lot about oAuth and the EoP part about DBus and UWSGI. In
Information# Box# Name: Cascade Profile: www.hackthebox.eu Difficulty: Medium OS: Windows Points: 30 Write-up# Overview# TL;DR: SMB enum users LDAP enum object properties SMB enum shares AD Recycl
Information# Box# Name: Book Profile: www.hackthebox.eu Difficulty: Medium OS: Linux Points: 30 Write-up# Overview# TL;DR: SQL truncation -> admin accounts SSRF -> XSS -> file disclosure
Information# Box# Name: ForwardSlash Profile: www.hackthebox.eu Difficulty: Hard OS: Linux Points: 40 Write-up# Overview# TL;DR: There is a web application with a parameter vulnerable to file discl
Information# Box# Name: ServMon Profile: www.hackthebox.eu Difficulty: Easy OS: Windows Points: 20 Write-up# Overview# TL;DR: We have to find some hints in a FTP, finds creds through a Path Travers
Write-up# Write-up pour le défi Dojo #44 - Surveillance du matériel créé par BrumensYWH. La solution officielle publiée par YesWeHack se trouve ici. C
Context# I had a 720 GB SATA SSD that was nearly full, so I bought a 2 TB NVMe SSD as an upgrade (both in storage and speed). As the migration will fo
Information Room# Name: Lesson Learned? Profile: tryhackme.com Difficulty: Easy Description: Have you learned your lesson? Write-up Overview# Install
Introduction# You have all seen the hype around XBOW: βthe AI that climbed 1st on HackerOne leaderboardβ. As often, when something new appears or a ne
Introduction# Vous avez tous vu le battage médiatique autour de XBOW : «l'IA qui s'est hissée à la première place du classement de HackerOne». Comme s
βββββββββββββββ βββββββ βββββββ βββββββ βββ βββ βββββββ βββ βββ βββββββββββββββββββββββββββββββββββββββββ βββ βββββββββββββββ βββ ββββββ βββββββββββββ
Official domain names of Rawsec services. The blog: URL Description https://blog.raw.pm/ Main domain hxxps://rawsec[.]ml/ Backup domain, taken over hx