Intelligence
Solving Intelligence machine from HackTheBox using active directory exploitation techniques
Solving Intelligence machine from HackTheBox using active directory exploitation techniques
Solving Conceal machine from HackTheBox. (SNMP and IKE VPN enumeration, FileUpload Vulnerability, Windows PrivEsc)
Solving Silo machine from HackTheBox by exploiting a vulnerable Oracle Service
Learn what access tokens are in windows and how they can be abused!
Solving Intelligence machine from HackTheBox using active directory exploitation techniques
Solving Node machine from HackTheBox. (Information Leakage, MongoDB, AbusingScheduled Tasks, Buffer Overflow, etc…)
Solving Conceal machine from HackTheBox. (SNMP and IKE VPN enumeration, FileUpload Vulnerability, Windows PrivEsc)
Solving Silo machine from HackTheBox by exploiting a vulnerable Oracle Service
Solving Vulnversity, the first room in the Offensive Pentesting learning path from TryHackMe
Solving Node machine from HackTheBox. (Information Leakage, MongoDB, AbusingScheduled Tasks, Buffer Overflow, etc…)
Solving Vulnversity, the first room in the Offensive Pentesting learning path from TryHackMe