Chaos, an interesting machine designed in the CTF-style, awaits our exploration. Letβs dive right in πππππ Key Elements π IMAP IMAP (Internet message access protocol) allows you to access your em...
Chaos
Carrier
Carrier was a unique challenge that will provide an opportunity to stretch some muscles most of us havenβt used in a long time πͺπͺπͺπͺπͺ Key Elements π SNMP Enumeration Simple Network Management Prot...
Joker
Joker is the first machine in my HTB series, from which I learned a lot. Highly recommend this one πππππ Key Elements π TFTP Trivial File Transfer Protocol (TFTP) is a simple protocol that provid...
Introducing the HTB series on my blog
Why I created this series? In this post, Iβll be introducing the HTB series. HTB is a platform that helps improve skills in cybersecurity. Iβll share my knowledge and insights from my experience w...
CVE-2023-2684: File Renaming on Upload <= 2.5.1 - Authenticated (Admin+) Stored Cross-Site Scripting
Introdution During my search for a plugin with the functionality to modify file names after uploading, I came across a particular plugin that seemed promising. As a security enthusiast, I decided ...
CVE-2022-4229: SourceCodester Book Store Management System 1.0 /bsms_ci/index.php Access Control
Introduction In the realm of cybersecurity, discovering a vulnerability and obtaining a CVE (Common Vulnerabilities and Exposures) entry is a significant achievement. It marks a milestone in an in...
CVE-2022-4228: SourceCodester Book Store Managerment System 1.0 Password Information Disclosure
A vulnerability classified as problematic has been found in SourceCodester Book Store Management System 1.0. This affects an unknown part of the file /bsms_ci/index.php/user/edit_user/. An Unauthen...
Port Redirection and Tunneling
Port Forwarding Port forwarding is the simplest traffic manipulation technique we will examine in which we redirect traffic destined for one IP address and port to another IP address and port. ...
Active Directory Attacks
Manually Enumeration Basic enumeration Use built-in net.exe application Who are you net user Enumerate all users net user /domain Enumerate all groups net group /domain Use powershell s...
Linux Privilege Escalation
NOTE: It is not always possible to escalate privileges to root, we have to escalate privileges to another non-root user, then escalate privileges to root Checklist Reference from PayloadsAllT...