TryHackMe: Wgel write-up
In this article we’ll tackle an easy CTF on TryHackMe. We’ll enumerate a Linux box, find misplaced credentials and exploit a common Linux tool to escalate our privileges and exfiltrate… Read more
In this article we’ll tackle an easy CTF on TryHackMe. We’ll enumerate a Linux box, find misplaced credentials and exploit a common Linux tool to escalate our privileges and exfiltrate… Read more
In this post we’ll take a look at the solution to the Inject challenge on HackTheBox. The solution involves abusing an LFI vulnerability and exploiting a misconfigured service to obtain… Read more
In this article we’ll crack the MonitorsTwo machine on HackTheBox. The solution involves exploiting an outdated version of Cacti (a server monitoring software), accessing a poorly protected MySQL database, cracking… Read more
In this article we’ll attempt to solve the Busqueda room from HackTheBox. The solution involves exploiting a Flask website to gain initial access, abusing custom python scripts and taking advantage… Read more
In this article, we’ll delve into the solution to the “Internal” TryHackMe Capture The Flag challenge. Our focus will be on the techniques used to enumerate and exploit both a… Read more
In this article, we’re gonna dive into the solution for the “Opacity” challenge. Our goal is to bypass a file-upload filter and exploit Linux permissions to get root access. Link… Read more
In this article, we will explore the solution to the “Eavesdropper” challenge, which involves monitoring Linux processes with limited privileges and exploiting the $PATH variable to gain root access on… Read more
This challenge shows how important it is to understand data representation and conversion techniques in cybersecurity. We need to find a hidden flag by converting ASCII codes into human-readable text…. Read more
In this article we are going to explore the solution to TryHackMe’s MD2PDF and exploit a Markdown converter. Link: https://tryhackme.com/room/md2pdf Difficulty: Easy Enumeration To begin the enumeration process, I launched… Read more
In this challenge, we will utilize a utility to extract metadata from an image file and use Base64 decoding to reveal the hidden flag. Digital images often contain more information… Read more
Recent comments