In this post, I would like to share a walkthrough of the Jab Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Jab machine? For the user flag, you need to gain access to a Jabber/XMPP server […]
Case Scenario 1. Analyzing Domain Controller Security Logs, can you confirm the date & time when the kerberoasting activity occurred? 2. What is the Service Name that was targeted? 3.It is really important to identify the Workstation from which this activity occurred. What is the IP […]
In this post, I would like to share a walkthrough of the Office Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Office machine? For the user flag, you need to look at the Joomla instance that […]
In this post, I would like to share a walkthrough of the Crafty Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Crafty machine? For the user flag, you must exploit a Minecraft server, which is particularly […]
In this post, I would like to share some walkthroughs on the Sherlock Challenges Noted can be considered an Easy Difficulty Firstly, we need to download the artefact into our attacker machine and unzip it to analyze further I managed to sighted all 7 directories and 4 files are […]
In this post, I would like to share a walkthrough of the Pov Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Pov machine? For the user flag, you must to exploit a file read and directory […]
In this post, I would like to share a walkthrough of the Analysis Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Analysis machine? For the user flag, you must exploit a PHP website that utilizes LDAP […]
In this post, I would like to share some walkthroughs on the Sherlock Challenges such Constellation can be considered a Medium Difficulty Case Study I am required to download the zip file from the hack the box platform. When I extract the file, I have presented with the IOCs […]
In this post, I would like to share a walkthrough of the Bizness Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Bizness machine? For the user flag, you will need to exploit CVE-2023-49070, an authentication bypass […]
In this post, I would like to share a walkthrough of the Ouija Machine from Hack the Box This room will be considered an Insane machine on Hack the Box What will you gain from the Ouija machine? For the user flag, you must abuse the smuggling vulnerability to enable access […]