Inject
Enumeration nmap ┌──(root㉿kali)-[/home/sire/Documents/CTFs/HackTheBox/Inject] └─# cat nmap.scans | grep open 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux...
Enumeration nmap ┌──(root㉿kali)-[/home/sire/Documents/CTFs/HackTheBox/Inject] └─# cat nmap.scans | grep open 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux...
Enumerations Nmap scan nmap -sV -A -T4 -vv -oN nmap.scans 10.10.10.6 There were 2 port open under 1000 ports port 80 port 22 Port 80 port 80 website looked like this here Did a dir...
Enumerations Nmap scan nmap -vv -sV -A -oN nmap.scan -T4 10.10.10.68 When I performed an nmap scan, I discovered that only port 80 was open among those under 10000. Nmap scan report for 10.10...
CVE-2023-0386 Enumerations Nmap scan nmap -vv -sV -oN nmap.scans 10.10.11.221 2 ports are open here Checking port 80 Here we have a old HTB webiste interface going to join , we are p...
Introduction What is Server Side Template Injection? Server Side Template Injection (SSTI) is a web exploit which takes advantage of an insecure implementation of a template engine. What is a temp...
Introduction Volatility is a free memory forensics tool commonly used by malware and SOC analysts within a blue team or as part of their detection and monitoring solutions. Volatility is written i...
Enumerations Nmap scan ┌──(root㉿kali)-[/home/…/Documents/CTFs/HackTheBox/Nibbles] └─# nmap -vv -sV -A -oN nmap.scans 10.10.10.75 -T4 -p- | grep open Discovered open port 22/tcp on 10.10.10.75 Dis...
Introduction On February 13th, 2024, Microsoft announced a Microsoft Outlook RCE & credential leak vulnerability with the assigned CVE of CVE-2024-21413(Moniker Link). Haifei Li of Check Point ...
Introduction Information Gathering How about we begin by nmap a scans to check which ports are currently being used? nmap -sV -vv -sC -oN nmap.scans 10.10.161.98 The nmap scan provided us wit...
Table of content Intoduction Hacking Phases in Bizness HTB Let’s Begin Information Gathering Directory Enumeration Vulnerability Analysis Exploitation ...