HackTheBox: Busqueda write-up
In this article we’ll attempt to solve the Busqueda room from HackTheBox. The solution involves exploiting a Flask website to gain initial access, abusing custom python scripts and taking advantage… Read more
In this article we’ll attempt to solve the Busqueda room from HackTheBox. The solution involves exploiting a Flask website to gain initial access, abusing custom python scripts and taking advantage… Read more
If you’re into ethical hacking and looking for a way to set up your own home virtual lab, you’ve come to the right place. In this article, I’ll share my… Read more
In this article, we’ll delve into the solution to the “Internal” TryHackMe Capture The Flag challenge. Our focus will be on the techniques used to enumerate and exploit both a… Read more
In this article, we’re gonna dive into the solution for the “Opacity” challenge. Our goal is to bypass a file-upload filter and exploit Linux permissions to get root access. Link… Read more
In this article, we will explore the solution to the “Eavesdropper” challenge, which involves monitoring Linux processes with limited privileges and exploiting the $PATH variable to gain root access on… Read more
This challenge shows how important it is to understand data representation and conversion techniques in cybersecurity. We need to find a hidden flag by converting ASCII codes into human-readable text…. Read more
Recent comments