Intelligence
Solving Intelligence machine from HackTheBox using active directory exploitation techniques
hackthebox windowsSolving Intelligence machine from HackTheBox using active directory exploitation techniques
hackthebox windowsSolving Conceal machine from HackTheBox. (SNMP and IKE VPN enumeration, FileUpload Vulnerability, Windows PrivEsc)
hackthebox windowsSolving Silo machine from HackTheBox by exploiting a vulnerable Oracle Service
hackthebox windowsLearn what access tokens are in windows and how they can be abused!
windowsSolving Intelligence machine from HackTheBox using active directory exploitation techniques
hackthebox windowsSolving Node machine from HackTheBox. (Information Leakage, MongoDB, AbusingScheduled Tasks, Buffer Overflow, etc…)
hackthebox linuxSolving Conceal machine from HackTheBox. (SNMP and IKE VPN enumeration, FileUpload Vulnerability, Windows PrivEsc)
hackthebox windowsSolving Silo machine from HackTheBox by exploiting a vulnerable Oracle Service
hackthebox windowsSolving Vulnversity, the first room in the Offensive Pentesting learning path from TryHackMe
tryhackme linuxSolving Node machine from HackTheBox. (Information Leakage, MongoDB, AbusingScheduled Tasks, Buffer Overflow, etc…)
hackthebox linuxSolving Vulnversity, the first room in the Offensive Pentesting learning path from TryHackMe
tryhackme linux