Jan 17 · 7 min read · Exploiting Metasploitable2 Using msfconsole (Kali Linux Lab) Introduction msfconsole is the heart of the Metasploit Framework and one of the most powerful tools used by penetration testers to identify, exploit, and validate security vulnerabilities. ...
Join discussion
Jan 1 · 4 min read · Challenge Description Category: Web exploitationAuthor: thee2d Modern authentication relies on more than just a password. Something you know, something you have, and something you are. Together, they're meant to provide layered security that can with...
Join discussion
Jan 1 · 5 min read · Challenge Description Category: Web exploitationAuthor: thee2d Intelligence analysts from the North Pole Logistics Directorate (NPLD) have uncovered a covert online storefront operated by the KRAMPUS Syndicate. Its name? Kramazon. Looks familiar. Wor...
Join discussion
Jan 1 · 2 min read · On Day 24, I reached the final technical hurdle before the ultimate battle with King Malhare. The mission, "Hoperation Eggsploit," required me to shut down a web control panel that the evil Easter Bunnies were using to keep a wormhole open for reinfo...
Join discussion
Jan 1 · 3 min read · For Day 20, the investigation focused on a sophisticated web vulnerability that allowed attackers to disrupt the Best Festival Company's (TBFC) limited-edition toy launch. Although only 10 sleigh toys were in stock, hundreds of customers received con...
Join discussion
Dec 31, 2025 · 2 min read · The Mission: Breaking the "Beardgate" Siege The situation in Wareville is critical: customers are being served authentic strands of Santa’s beard instead of noodles. A security engineer was locked out by Sir CarrotBaine before he could restore the si...
Join discussion
Dec 27, 2025 · 2 min read · Introduction: Back for More at Wareville Following my deep dive into Active Directory, I am taking a massive leap into hands-on practice with the TryHackMe Advent of Cyber 2025. For the uninitiated, this is a free, story-driven event that teaches cri...
Join discussion
Nov 2, 2025 · 9 min read · Recon ┌──(kali㉿kali)-[~] └─$ nmap -sC -sV -O -p- 10.10.11.83 -Pn Les règles du Pare-feu m'empêchent, de faire mon scan habituel. ┌──(kali㉿kali)-[~] └─$ nmap -sS -P0 10.10.11.83 -sV Starting Nmap 7.95 ( https://nmap.org ) at 2025-09-22 18:24 EDT Nmap...
Join discussion
Oct 2, 2025 · 2 min read · Category: Enumeration / Privilege EscalationSource: TryHackMe Difficulty: EasyObjective: Capture user & root flags Task 1 Living up to the title. You were boasting on and on about your elite hacker skills in the bar and a few Bounty Hunters decided t...
Join discussion