Main Page

From aldeid
Jump to navigation Jump to search

Pentesting   •    Web Exploitation   •    Cryptography   •    Forensics   •    Reversing   •    Binary Exploitation   •    CTF

email twitter github RSS


TryHackMe, Develpy

Thu, 2 Jul 2020 21:33:00 +0000

boot2root machine for FIT and bsides Guatemala CTF. Interesting challenge with code injection in a python program running on a socket. Classical root escalation via the crontab jobs.

Read more


TryHackMe, djinn

Thu, 2 Jul 2020 06:50:00 +0000

Intermediate level vulnerable box. Great adventure with FTP, SSH, port knocking, python scripting, decompiling and evasion.

Read more


TryHackMe, Node 1

Fri, 26 Jun 2020 06:50:00 +0000

Node is a medium level boot2root challenge, originally created for HackTheBox. This challenge requires several techniques to exploit the machine, which makes it a great journey into hacking (nodejs, password cracking, password encrypted backup, privesc, exploit with mongodb, reverse engineering, ..). This is a great challenge!

Read more


TryHackMe, HA Joker CTF

Tue, 23 Jun 2020 12:00:00 +0000

Enumerate services, brute force accounts, discover a hidden backup, crack hashes and escalate privileges using a Linux container.

Read more


TryHackMe, Blueprint

Sun, 21 Jun 2020 09:11:00 +0000

Exploit a vulnerable OSCommerce web application hosted on a Windows 7 machine. Upgrade your shell session to a meterpreter in Metasploit, and dump the password hashes.

Read more


TryHackMe, UltraTech

Sat, 20 Jun 2020 09:00:00 +0000

Discover hidden routes in nodes.js using fuzzing techniques, and exploit an API. Then escalate your privileges exploiting docker.

Read more


TryHackMe, CMesS

Thu, 18 Jun 2020 23:28:00 +0000

Can you root this Gila CMS box? In this challenge by TryHackMe, you'll discover a CMS called Gila CMS and you will have to exploit it to get root.

Read more


TryHackMe, Jack

Thu, 18 Jun 2020 18:38:00 +0000

TryHackMe, Jack is a nice challenge where you'll have to exploit a vulnerable Worpress installation and escalate your privileges.

Read more


Overflow MySQL VARCHAR()

Fri, 24 Apr 2020 12:53:00 +0000

This post shows how you can overflow a VARCHAR() field and exploit it to access unexpected data from the database.

Read more


What are /dev/usbmon{N} interfaces

Mon, 23 Mar 2020 20:30:00 +0000

Understand what /dev/usbmon{N} interfaces are, how to capture USB traffic and how to interpret captured data.

Read more

Older entries »