Escape- Hackthebox lab
To start the assessment, I start with my nmap scans to check for open TCP and UDP ports. Looks like a domain controller with a SQL service. I use the tool smbclient to check for any smb share that look Read more
To start the assessment, I start with my nmap scans to check for open TCP and UDP ports. Looks like a domain controller with a SQL service. I use the tool smbclient to check for any smb share that look Read more
This assessment was tough, the foothold was really demanding and helped me learn a lot. I started off with port scans using the tool Nmap for both TCP and UDP ports. The site on port 80 was a website created Read more
I started this one with an nmap scan for both TCP and UDP ports. With the Nmap results, I started enumerating port 80. With this error, I am able to enumerate the website domain name and input that information into Read more
icked off the assessment with a thorough Nmap scan to discover open ports and fingerprint the services running on the Forest host. After identifying RPC on 135, I used rpcclient to connect anonymously and enumerate every domain user. I compiled Read more
I began this engagement by conducting an Nmap scan to identify open ports on the target. The results revealed several ports in use, including ports 88 (Kerberos), 135 (RPC), 389 (LDAP), and 445 (SMB), which strongly suggested the target was Read more
Hackers often seek to steal a variety of personal and sensitive information for malicious purposes such as identity theft, financial fraud, or unauthorized access. Here’s a list of key pieces of information hackers typically target:
Cybersecurity can often feel overwhelming, especially for those without a technical background. However, the Center for Internet Security (CIS) has created a set of guidelines known as the CIS Critical Security Controls (CIS Controls) to help organizations of all sizes Read more
In the world of cybersecurity, penetration testers are constantly probing and testing networks to identify vulnerabilities before they can be exploited maliciously. Among the plethora of tools at their disposal, EyeWitness emerges as a powerful ally, enabling testers to visualize Read more
I came across a cool Firefox extension in the Practical Bug Bounty course by TCM Security. This extension is called Firefox Multi-Account Containers by Mozilla Firefox. This extension will enable you to have separate Firefox browser sessions in one web Read more
SSL Certificates to TLS Certificates SSL (Secure Sockets Layer) certificates, now more commonly referred to as TLS (Transport Layer Security) certificates, are digital certificates that facilitate secure, encrypted communication over the internet. They play a vital role in protecting sensitive Read more