In this post, I would like to share a walkthrough of the Usage Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Usage machine? For the user flag, you need to abuse blind SQL injection vulnerability in a password […]
In this post, I would like to share a walkthrough of the Monitored Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Monitored machine? For the user flag, you will need to abuse the Nagios XI software, […]
In this post, I would like to share a walkthrough of the Intentions Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Intentions machine? For the user flag, you will need to abuse […]
In this post, I would like to share a walkthrough of the Soccer Machine from Hack the Box This room will be considered an Easy machine on Hack The Box What will you gain from the Soccer machine? For the user flag, you will find a website […]
In this post, I would like to share some knowledge about SQL Injection which can be useful during Penetration Testing activity. Before we went deeper into it, I will try to explain what is SQL Injection for those who are not familiar with it. SQL injection […]
In this post, I would like to share a walkthrough of the Trick Machine from Hack the Box This room will be considered an Easy machine on Hack The Box What will you gain from the Trick machine? For the user flag, you will need to exploit SQL Injection […]
In this post, I would like to share a walkthrough of the StreamIO Machine from Hack the Box This room will be considered a medium machine on Hack The Box What will you gain from the StreamIO machine? For the user flag, you will need to explore more on […]
In this post, I would like to share a walkthrough of the Seventeen Machine from Hack the Box This room will be considered a Hard machine on Hack The box What will you gain from the Seventeen machine? For the user flag, you will need to play with SQL […]
In this post, I would like to share a walkthrough of the Phoenix Machine from Hack the Box This room will be considered as a Hard machine on Hack The box What will you gain from the Phoenix machine? For the user flag, you will need to abuse a vulnerability […]