Home
msplmee
Cancel
Preview Image

Chaos

Chaos, an interesting machine designed in the CTF-style, awaits our exploration. Let’s dive right in πŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒ Key Elements πŸ“– IMAP IMAP (Internet message access protocol) allows you to access your em...

Preview Image

Carrier

Carrier was a unique challenge that will provide an opportunity to stretch some muscles most of us haven’t used in a long time πŸ’ͺπŸ’ͺπŸ’ͺπŸ’ͺπŸ’ͺ Key Elements πŸ“– SNMP Enumeration Simple Network Management Prot...

Preview Image

Joker

Joker is the first machine in my HTB series, from which I learned a lot. Highly recommend this one 🌟🌟🌟🌟🌟 Key Elements πŸ“– TFTP Trivial File Transfer Protocol (TFTP) is a simple protocol that provid...

Preview Image

Introducing the HTB series on my blog

Why I created this series? In this post, I’ll be introducing the HTB series. HTB is a platform that helps improve skills in cybersecurity. I’ll share my knowledge and insights from my experience w...

Preview Image

CVE-2023-2684: File Renaming on Upload <= 2.5.1 - Authenticated (Admin+) Stored Cross-Site Scripting

Introdution During my search for a plugin with the functionality to modify file names after uploading, I came across a particular plugin that seemed promising. As a security enthusiast, I decided ...

Preview Image

CVE-2022-4229: SourceCodester Book Store Management System 1.0 /bsms_ci/index.php Access Control

Introduction In the realm of cybersecurity, discovering a vulnerability and obtaining a CVE (Common Vulnerabilities and Exposures) entry is a significant achievement. It marks a milestone in an in...

Preview Image

CVE-2022-4228: SourceCodester Book Store Managerment System 1.0 Password Information Disclosure

A vulnerability classified as problematic has been found in SourceCodester Book Store Management System 1.0. This affects an unknown part of the file /bsms_ci/index.php/user/edit_user/. An Unauthen...

Preview Image

Port Redirection and Tunneling

Port Forwarding Port forwarding is the simplest traffic manipulation technique we will examine in which we redirect traffic destined for one IP address and port to another IP address and port. ...

Preview Image

Active Directory Attacks

Manually Enumeration Basic enumeration Use built-in net.exe application Who are you net user Enumerate all users net user /domain Enumerate all groups net group /domain Use powershell s...

Preview Image

Linux Privilege Escalation

NOTE: It is not always possible to escalate privileges to root, we have to escalate privileges to another non-root user, then escalate privileges to root Checklist Reference from PayloadsAllT...