Terminal Intelligence Securityterminalintelligencesecurity.hashnode.dev·Mar 10, 2024Perfection HTB WriteupDuring enumeration, it was noticed that Input validation bypass refers to exploiting weaknesses in an application’s validation checks to submit malicious data that bypasses intended restrictions. Attackers use techniques like filter evasion, context ...1.5K readsPerfection-walkthrough,
Pradip Deyp3ntesterinstanc3.hashnode.dev·Dec 4, 2023Manager HTB Writeup / WalkthroughThe “Manager” machine is created by Geiseric. This is a medium HTB machine with a strong focus on Active Directory Exploitation. So, let’s start……….. Enumeration Add ip to /etc/hosts file as : 10.10.11.236 manager.htb Using Nmap nmap -sC -sV -O ...1 like·291 readscertipy
Pradip Deyp3ntesterinstanc3.hashnode.dev·Sep 24, 2023Format HTB Walkthrough/WriteupThe “Format” machine is created by coopertim13. This is a medium HTB machine with a strong emphasis on Redis usage and the orchestration of chained attacks. Enumeration Using Nmap nmap -sC -sV -O 10.10.11.213 -A -T4 --min-rate=1000 Nmap scan report ...1 like·170 readsoffensive-security
Pradip Deyp3ntesterinstanc3.hashnode.dev·Sep 17, 2023CozyHosting HTB Writeup/WalkthroughThe “CozyHosting” machine is created by “commandercool”. This is an easy machine with a strong focus on web application security vulnerabilities which enables us to get the reverse shell of the machine. So, let’s start… Enumeration Using Nmap nmap -s...1 like·1.6K readshtb-academy