Cybertalents – threat con ctf 2019 – online now writeup

threat con ctf 2019

So this one was 200 points hard challenge. I guess only one guy was able to do it. I was a little bit disappointed that I was not able to do it on time. Anyway here is the writeup. Let us begin with the URL, the URL for the challenge was which is as […]

hackthebox bounty walkthrough

Starting with nmap port 80 shows just a picture named merlin.jpg. Possibly a user in the box. Doing gobuster and scanning with .aspx extension we get two things of interest. First transfer.aspx where we can upload files and second UploadedFiles where we get to access the files we uploaded. Doing enumeration, we find that we […]

hackthebox optimum walkthrough

Starting with nmap Port 80 is HFS, If we try to login then we will get an unauthorized error. Following is the screenshot. Using searchploit to find if there is any vulnerabilities related to HFS Cloning one with Remote Command Execution There are two things we should do before running above python script. First is […]

hackthebox blue walkthrough

Starting with nmap Checking the smb We can check further in Share and Users. Searching if any vulnerability is present using searchploit EternalBlue seems to be interesting. There is a Github repo to exploit this automatically. Let’s clone the repo Then follow the README and generate shellcode This will make sc_all.bin shellcode. Now run the […]

hackthebox legacy walkthrough

Starting with nmap smb port 445 is open and the machine is XP….legacy Searching on the internet, xp is affected by ms08-067, CVE-2008-4250 Further python exploit is available for this. We can download it from here. First of all we need to change the shellcode in the script. For this we are going to generate […]