Grace McNerneymissclaptrap.hashnode.dev·Sep 16, 2023Writeup - OverTheWire Bandit5This level is kind of an expansion on the previous one, where we began learning how to utilize different commands to filter search results. In this exercise, the password for the next level is found in a file that is 1) human-readable, 2) 1033 bytes ...DiscussLinux
Grace McNerneymissclaptrap.hashnode.dev·Sep 15, 2023Writeup - OverTheWire Bandit4This one is a little more tricky. The prompt tells us that the password is located in the only human-readable file in the inhere directory. There are several files, so examining each is possible, but a little clunky. The first step after logging in i...DiscussLinux
Grace McNerneymissclaptrap.hashnode.dev·Sep 15, 2023Writeup - OverTheWire Bandit3The purpose of this level is to teach the user how to maneuver between directories and how to handle filenames that begin with a period. The first step, as always, is to use the command ls -la to view the files in the current directory. This will sho...DiscussLinux
Grace McNerneymissclaptrap.hashnode.dev·Sep 5, 2023Writeup - OverTheWire Bandit2The purpose of this level is to demonstrate how to handle filenames that contain spaces. After SSH-ing into bandit2 using the password found in the previous level, the password for the next level can be found in a file named "spaces in this filename....DiscussWrite Up
Grace McNerneymissclaptrap.hashnode.dev·Sep 5, 2023Weekly Wrap-Up - Bandit Labs and Big PlansHeading into Fall with some big plans. It's been a minute since I updated this blog, but here's what I've been up to: Studying for ISC(2) "Certified in CyberSecurity" as part of their "Million Certified in CyberSecurity" initiative Enrolled and am ...DiscussWrite Up
Victor Riverablog.vicriversec.com·Aug 28, 2023HackTheBox - PCSummary In this box, an unknown port leads us to enumerate a possible technology and build an instance of it locally on our kali. We will leverage an SQL Injection to gain credentials into the machine and once there, we will find an internal port tha...Discuss·1 like#HackTheBox
Christoph Behrchristophbehr.hashnode.dev·Aug 24, 2023TryHackMe/Vulnhub Mr. Robot WriteupEnumeration First things first, after an ip route my host network was revealed as 10.38.1.0/24. Let's look around in the network. nmap -sP 10.38.1.0/24 shows the IP 10.38.1.111 in the network. Hence this should be the victim IP. Another Nmap run, thi...Discusstryhackme
Securiosecurio.hashnode.dev·Aug 21, 2023Intro to Threat EmulationIntroduction Red and Blue Teams play a crucial role in recognizing, discovering, and remediating vulnerabilities. In an ever-changing landscape of digital threats, security operations centers (SOCs) must counteract the shortage of cybersecurity exper...DiscussWriteupstryhackme
Christian Spirosudopls.hashnode.dev·Aug 18, 2023Proving Grounds Walkthrough: AstronautOffsec Rating: Easy - Community Rating: Intermediate I'd agree with the Offsec rating on this one. I decided to complete this box as part of my ongoing quest to hack one machine a day. It's a new habit but I am hoping that completing writeups will ke...Discuss#walkthrough
mateosolinhomateosolinho.hashnode.dev·Aug 18, 2023Jerry - HTB WriteupJerry es una máquina de dificultad Easy en la plataforma Hack The Box En esta máquina explotaremos una vulnerabilidad en el servicio Apache por el puerto 8080 Reconocimiento Como siempre utilizaremos la herramienta nmap para reportar los puertos abi...Discuss#cybersecurity