<mediawiki xmlns="http://www.mediawiki.org/xml/export-0.11/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.mediawiki.org/xml/export-0.11/ http://www.mediawiki.org/xml/export-0.11.xsd" version="0.11" xml:lang="en">
  <siteinfo>
    <sitename>aldeid</sitename>
    <dbname>ald1210912434520</dbname>
    <base>https://www.aldeid.com/wiki/Main_Page</base>
    <generator>MediaWiki 1.45.3</generator>
    <case>first-letter</case>
    <namespaces>
      <namespace key="-2" case="first-letter">Media</namespace>
      <namespace key="-1" case="first-letter">Special</namespace>
      <namespace key="0" case="first-letter" />
      <namespace key="1" case="first-letter">Talk</namespace>
      <namespace key="2" case="first-letter">User</namespace>
      <namespace key="3" case="first-letter">User talk</namespace>
      <namespace key="4" case="first-letter">Aldeid</namespace>
      <namespace key="5" case="first-letter">Aldeid talk</namespace>
      <namespace key="6" case="first-letter">File</namespace>
      <namespace key="7" case="first-letter">File talk</namespace>
      <namespace key="8" case="first-letter">MediaWiki</namespace>
      <namespace key="9" case="first-letter">MediaWiki talk</namespace>
      <namespace key="10" case="first-letter">Template</namespace>
      <namespace key="11" case="first-letter">Template talk</namespace>
      <namespace key="12" case="first-letter">Help</namespace>
      <namespace key="13" case="first-letter">Help talk</namespace>
      <namespace key="14" case="first-letter">Category</namespace>
      <namespace key="15" case="first-letter">Category talk</namespace>
    </namespaces>
  </siteinfo>
  <page>
    <title>Main Page</title>
    <ns>0</ns>
    <id>1576</id>
    <revision>
      <id>38839</id>
      <parentid>38837</parentid>
      <timestamp>2025-04-23T18:17:31Z</timestamp>
      <contributor>
        <username>Sebastien.damaye</username>
        <id>2</id>
      </contributor>
      <origin>38839</origin>
      <model>wikitext</model>
      <format>text/x-wiki</format>
      <text bytes="5114" sha1="bichdvmteihlkufw6r1jsiqdeuumsuh" xml:space="preserve">{| style="{{linear-gradient|top|#fff, #eee}}" width="100%" cellpadding="10"
|
&lt;span itemscope itemtype="//schema.org/Article"&gt;[[:Category:Penetration-testing|&lt;font size="3"&gt;'''Pentesting'''&lt;/font&gt;]]&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span itemscope itemtype="//schema.org/Article"&gt;[[:Category:Encryption|&lt;font size="3"&gt;'''Cryptography'''&lt;/font&gt;]]&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span itemscope itemtype="//schema.org/Article"&gt;[[:Category:Digital-Forensics|&lt;font size="3"&gt;'''Forensics'''&lt;/font&gt;]]&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span itemscope itemtype="//schema.org/Article"&gt;[[:Category:Reverse-Engineering|&lt;font size="3"&gt;'''Reversing'''&lt;/font&gt;]]&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span itemscope itemtype="//schema.org/Article"&gt;[[:Category:Exploits|&lt;font size="3"&gt;'''Binary Exploitation'''&lt;/font&gt;]]&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span itemscope itemtype="//schema.org/Article"&gt;[[:Category:CTF|&lt;font size="3"&gt;'''CTF'''&lt;/font&gt;]]&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span itemscope itemtype="//schema.org/Article"&gt;[[:Category:ThreatHunting|&lt;font size="3"&gt;'''Threat Hunting'''&lt;/font&gt;]]&lt;/span&gt;
| align="right" |
[[Image: mailto.png|link=https://spamty.eu/mail/v4/1513/QovA91huoP7d2fe196/|email]]
[[Image: twitter-logo.png|link=http://www.twitter.com/sebastiendamaye|twitter]]
[[Image: github-logo.png|link=https://github.com/sebastiendamaye|github]]
[[Image: rss-logo.png|link=http://feeds.feedburner.com/aldeidnews|RSS]]
|}
{{News4|[[File:Icon-Navigating-the-Dark-Web.png|link=https://navigating-the-darkweb.readthedocs.io/]]|Navigating the Dark Web|Wed, 23 Apr 2025 07:54:00 +0000|“Navigating the Dark Web: A Comprehensive Guide to Darknets, Tools, and Intelligence” is an online book written by Sébastien Damaye. This book explains what the Dark Web is, how to access it, what content to expect, how to monitor the Dark Web and why it matters. I wrote this book to address many questions people have, to demystify the Dark Web, and share my experience with others.|[https://navigating-the-darkweb.readthedocs.io/ Read more]}}
{{News4|[[File:Icon-TryHackMe-Unbaked-Pie.png|link=TryHackMe-Unbaked-Pie]]|TryHackMe &gt; Unbaked Pie|Sun, 6 Jun 2021 11:34:00 +0000|Enumerate a Django application, find a vulnerability, exploit a pickle session cookie, evade a docker environment, find a way to forward ports, brute force an SSH account, this challenge is really interesting. Medium to hard difficulty.|[[TryHackMe-Unbaked-Pie|Read more]]}}
{{News4|[[File:Icon-TryHackMe-Cooctus-Stories.png|link=TryHackMe-Cooctus-Stories]]|TryHackMe &gt; Cooctus Stories|Fri, 28 May 2021 06:50:00 +0000|This room is about the Cooctus Clan... funny challenge with a bit of enumeration, a bit of development, and a quite uncommon privilege escalation.|[[TryHackMe-Cooctus-Stories|Read more]]}}
{{News4|[[File:Icon-TryHackMe-VulnNet-Roasted.png|link=TryHackMe-VulnNet-Roasted]]|TryHackMe &gt; VulnNet Roasted|Fri, 28 May 2021 06:48:00 +0000|VulnNet Entertainment quickly deployed another management instance on their very broad network... Easy challenge involving a Windows machine where you'll need to find network shares, list domain users, dump hashes, dump and crack hashes, and more...|[[TryHackMe-VulnNet-Roasted|Read more]]}}
{{News4|[[File:Icon-TryHackMe-VulnNet-Internal.png|link=TryHackMe-VulnNet-Internal]]|TryHackMe &gt; VulnNet Internal|Thu, 27 May 2021 11:48:00 +0000|VulnNet Entertainment learns from its mistakes, and now they have something new for you... Easy/Medium challenge with a variety of services to exploit (Samba, NFS, Redis, TeamCity) to get the flags.|[[TryHackMe-VulnNet-Internal|Read more]]}}
{{News4|[[File:Icon-TryHackMe-toc2.png|link=TryHackMe-toc2]]|TryHackMe &gt; toc2|Wed, 26 May 2021 07:00:00 +0000|It's a setup... Can you get the flags in time? Medium level challenge where you'll need to exploit a race condition for the privilege escalation.|[[TryHackMe-toc2|Read more]]}}
{{News4|[[File:Icon-TryHackMe-The-Marketplace.png|link=TryHackMe-The-Marketplace]]|TryHackMe &gt; The Marketplace|Sun, 23 May 2021 09:05:00 +0000|Can you take over The Marketplace's infrastructure? Medium difficulty challenge involving session authentication token, XSS, SQL injection and more.|[[TryHackMe-The-Marketplace|Read more]]}}
{{News4|[[File:Icon-TryHackMe-Debug.png|link=TryHackMe-Debug]]|TryHackMe &gt; Debug|Thu, 20 May 2021 16:13:00 +0000|Linux Machine CTF! You'll learn about enumeration, finding hidden password files and how to exploit php deserialization!|[[TryHackMe-Debug|Read more]]}}
{{News4|[[File:Icon-TryHackMe-En-pass.png|link=TryHackMe-En-pass]]|TryHackMe &gt; En-pass|Sun, 16 May 2021 21:07:00 +0000|Medium level CTF challenge involving web enumeration, SSH keys, web fuzzing, and avoiding the rabbit holes.|[[TryHackMe-En-pass|Read more]]}}
{{News4|[[File:Icon-TryHackMe-Wekor.png|link=TryHackMe-Wekor]]|TryHackMe &gt; Wekor|Wed, 12 May 2021 11:58:00 +0000|Medium level CTF challenge involving SQLi, WordPress, vhost enumeration and recognizing internal services ;)|[[TryHackMe-Wekor|Read more]]}}

&lt;p&gt;[[Archives|Older entries &amp;raquo;]]&lt;/p&gt;</text>
      <sha1>bichdvmteihlkufw6r1jsiqdeuumsuh</sha1>
    </revision>
  </page>
</mediawiki>
