Feb 12 · 5 min read · Crocodile is a beginner-friendly Linux room that focuses on fundamental enumeration techniques, including Nmap scanning, anonymous FTP access, and directory brute forcing. In this walkthrough, we will take a structured approach to identifying exposed...
Join discussionFeb 10 · 3 min read · This write-up follows the same format and structure as my previous articles, combining short theoretical questions with a practical walkthrough to demonstrate how a misconfigured MySQL/MariaDB service can expose sensitive data. Task 1 During our sca...
Join discussionFeb 8 · 3 min read · This article covers a mix of theoretical knowledge and hands-on practice focused on the SMB (Server Message Block) protocol. Using the Dancing room on HackTheBox, I demonstrate how basic SMB enumeration works in a real environment and how misconfigur...
Join discussionFeb 8 · 3 min read · This article focuses on identifying and exploiting a misconfigured Redis service using the Redeemer room on HackTheBox. It combines essential theory with hands-on enumeration to show how exposed Redis instances can leak sensitive data. Task 1 Which ...
Join discussionFeb 4 · 3 min read · Questions: According to the sources cited by Mitre, in what year did the Sandworm Team begin operations? Pretty straightfoward. Just google Sandworm Team andyou’ll find the MITRE listing about them. Answer: 2009 Mitre notes two credential access ...
Join discussion
Feb 3 · 4 min read · Questions: According to MITRE ATT&CK, what previously known malware does DRATzarus share similarities with? Lookup DRATzarus on the MITRE ATT&CK website. You’ll find the answer in the first para itself. Answer: Bankshot Which Windows API functio...
Join discussion