Exploiting a recent vulnerability on TryHackMe.
Author Archives: r43v0s
OSCP, take 1
Attempt 1 of my OSCP journey in the books. Didn’t pass, but hopefully took some good lessons learned.
HackTheBox – Knife
This is a really, really fast box. Or it can be, I guess. I don’t have much to blurb about for this one, so let’s just get into it!
HackTheBox – Bank
In this box, we’re tasked with breaking into a bank! Or at least into one of their servers. It’s a quick and easy box, with at least a couple of different paths to exploit the web app, as well as a couple of different paths to escalate privileges.
THM – Gatekeeper
Yet another buffer overflow! But at least I got to learn about a new tool for privesc!
THM – Brainpan 1
BOF a Windows application running on a Linux system.
THM – Brainstorm
We delve into exploiting a buffer overflow vulnerability on a Windows machine.
THM – Internal
Internal is a CTF box that has a “role-playing” element, in that you are “hired” by a client to pentest their network. There are several twists and turns along the way, including pivoting to another system (kinda) and a couple of red herrings. Unlike most TryHackMe boxes, this one doesn’t have a series of tasksContinue reading “THM – Internal”
THM – Fowsniff
The Fowsniff corporation has been hacked! Let’s see what havoc we can wreak with leaks from the breach.
THM – Alfred
Even Batman needs help with his security posture.