Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jan 25, 2024Seal - Hack The BoxReconnaissance First, we start with a full port scan to verify all possible open ports. ─[us-dedivip-1]─[10.10.16.200]─[jpfguedes@htb]─[~/htb/Seal] └──╼ [★]$ sudo nmap -v -sS -Pn -p- 10.10.10.250 PORT STATE SERVICE 22/tcp open ssh 443/tcp op...Discuss·71 readsoffensivesecurity
Azizul maqsudazizulmaqsud-1684501031000.hashnode.dev·Jun 1, 2023Penetration testing vs Vulnerability Scanning: A Comparative StudyPenetration testing seeks to exploit a security gap, while vulnerability scanning checks for known exposures and generates a report that can be used for risk mitigation. Searching and Scanning Security Breaches One of the most important parts of a so...Discuss·57 readspenetration testing
Abdul HakimforNubsec's Communitynubsec.hashnode.dev·Feb 25, 2023PenTest IntroductionWhat is PenTest? PenTest is the acronym for "Penetration Testing" or a kind of activity that conducts to identify any security weakness and vulnerabilities that may exist in our network or system. There are many ways to perform Penetration Testing in...Discuss·52 readsPentest
mauvehedrant.mvh.dev·Feb 17, 2023How I hacked a building with a can of cokeThe introduction The following story is intended to outline a few different elements I've discovered in myself since receiving an ADHD diagnosis in late 2020 and reflecting on my life and childhood. I've long struggled to understand why I made some o...Discuss·6.9K readsSecurityhacking
zer0dforInfos3c Blogsread.infos3c.net·Dec 7, 2022The Story Of How I Bypass SSO LoginHello everyone, I decided to tell you my stories about offensive security. This is the first story I share on my blog. Hope it will be a good start. In these stories, of course, I can not give the company names but I will tell you how it happened and...Discuss·8 likes·156 readspentesting
Sergei Zaiatshacking4ra.men·Sep 27, 2020Buffer Overflow 101Introduction What is a Buffer Overflow? In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites adjacent memory loca...DiscussRoad to OSCPpentesting
Sergei Zaiatshacking4ra.men·Sep 26, 2020HackTheBox Tabby writeupTabby is an easy Linux machine from HackTheBox, that is part of the pool of machines that are recommended for preparation for OSCP certification. Enumeration Start with nmap scan: nmap -sC -sV 10.10.10.194 Starting Nmap 7.80 ( https://nmap.org ) at 2...DiscussRoad to OSCPpentesting
Sergei Zaiatshacking4ra.men·Sep 26, 2020TryHackMe Internal writeupInternal is the last machine in the “Advanced Exploitation” part of TryHackMe’s “Offensive pentesting” path. Enumeration As I’m starting to prepare for my “Dry run” for the OSCP exam, this time I will use more stuff from my methodology. We already le...DiscussRoad to OSCPpentesting
Sergei Zaiatshacking4ra.men·Sep 25, 2020TryHackMe Relevant writeupRelevant is the eighth machine in the “Advanced Exploitation” part of TryHackMe’s “Offensive pentesting” path. Enumeration Nmap scan result: nmap -sC -sV -o nmap.txt <target_ip> 80/tcp open http Microsoft IIS httpd 10.0 135/tcp open ms...DiscussRoad to OSCPpentesting
Sergei Zaiatshacking4ra.men·Sep 24, 2020TryHackMe Skynet writeupSkynet is the fifth machine in the “Advanced Exploitation” part of TryHackMe’s “Offensive pentesting” path Enumeration Let’s start with the nmap scan: nmap -sC -sV -o nmap.txt <target_ip> 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 80...Discuss·1 likeRoad to OSCPpentesting