In this post, I would like to share some walkthroughs on the Sherlock Challenges such as Ore which can be considered a medium Difficulty Introduction of Ore Challenge In this challenge, You’ll grapple with an anomaly in Forela’s AWS infrastructure, managed by a technical partner. After deploying an […]
In this post, I would like to share a walkthrough of the Visual  Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Visual machine? For the user flag, you will need to abuse the platform where […]
In this post, I would like to share a walkthrough of the Drive Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Drive machine? For the user flag, you will need to exploit an IDOR vulnerability that […]
In this post, I would like to share some walkthroughs on the Sherlock Challenges such as HyperFiletable which can be considered an Easy difficulty Introduction of Hyperfiletable Challenge In this challenge, you will address the consequences of a sophisticated phishing attack directed at a recent recruit within Forela. Unbeknownst to […]
In this post, I would like to share a walkthrough of the Builder Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Builder machine? For the user flag, you will need to exploit a recent Jenkins vulnerability, […]
In this post, I would like to share a walkthrough of the Keeper Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Keeper machine? For the user flag, you will need to utilize […]
Case Scenario Firstly, we need to download the zip file into our machine and extract the file to proceed further From the screenshot above, we notice that there are two other files that we need to investigate deeper Before we analyze all the files stored inside […]
In this post, I would like to share a walkthrough of the Registrytwo Machine from Hack the Box This room will be considered an Insane machine on Hack the Box What will you gain from the Registrytwo machine? For the user flag, you will need to utilize a Docker Registry and […]