GIAC GPCS/SANS 510 – GIAC Public Cloud Security

My certification journey for #SANS #GIAC #SEC510 #GPCS

HTB Series #4 Netmon

This is the 4th machine in Hack the Box[HTB] series. This machine has retired from the Active machines' list and falls in the category of Easy machines. The aim of this box is going to be the same as other HTB machines i.e. find user and root[system] flag. The target IP is 10.10.10.152 and the... Continue Reading →

THM Series #6 Ignite

Another room from TryHackMe focusing on exploiting an RCE and Default configuration. The room is rated as Easy on the platform. The room can be accessed here. As per the room description, we have a newly deployed Web Server and there seems to be issues with the web server configuration. We are supposed to find... Continue Reading →

THM Series #5 Kenobi

To maintain the streak of continuous presence on TryHackMe, I tried my hands on another easy level machine. I am trying to cover easy machines and have the write up updated before scaling to medium difficulty. I selected Kenobi which is described as this room will cover accessing a Samba share, manipulating a vulnerable version... Continue Reading →

THM Series #4 Brooklyn Nine Nine

Back after a break with a room dedicated to one of my favorite shows Brooklyn Nine Nine. As per TryHackMe, the room is categorized as easy. The room can be accessed here. I too find it apt for the beginner category and very easy if we follow the guideline to test the basics before going... Continue Reading →

THM Series #3 Bounty Hacker

Another easy box from Try Hack Me. The CTF can be accessed here. Let's start the journey. The first step of the approach is to enumerate the open services on the asset. The nmap detected 3 ports to be open on the asset. Port 21, 22 and 80. Nmap Output I tried logging into the... Continue Reading →

HTB Series #3 Devel

I am back with another box Devel in Hack The Box series. This is going to be the #3 machine in my HTB series. The box is categorized as easy. Let's start with owning the box. Target IP: 10.129.61.24 As usual the first step was to run a nmap scan against the target machine. As... Continue Reading →

THM Series #2 Avengers Blog

Another attempt to share walkthrough and this time it is Avengers Blog from Try Hack Me platform. THM describes this activity as "A beginner guide to SQL and Command Injection". Deploy the target machine Deploy Q1. On the deployed Avengers machine you recently deployed, get the flag1 cookie value. NMAP Result I performed a nmap... Continue Reading →

THM Series #1 Blue

It has been another long break but again back to writing which I like from the heart. In this post, I am going to take you through steps, which I performed to complete the task on Try Hack Me. The activity Blue has been described by THM as "this is an educational series for complete... Continue Reading →

Website Powered by WordPress.com.

Up ↑