Elevate your productivity with TMUX!

This is a overview of how to use TMUX for the people that haven’t used it before. tmux is a terminal multiplexer for Unix-like operating systems. It allows multiple terminal sessions to be accessed simultaneously in a single window. It is useful for running more than one command-line program at the same time. https://en.wikipedia.org/wiki/Tmux Learning …

Writeup

So this box is going to be a challenge if you have done the 4 previous boxes. It use’s a lot of the same methodology as the previous boxes, where you scan and use and exploit to gain a user shell. Getting root on this box is where this box is tricky, it isn’t difficult …

insecure deserialization

For this, we will be getting all of our information from OWASP which can be found here. We will start off by looking at the Threat agents & attack vectors along with the impact. “Threat Agents/Attack Vectors: Exploitation of deserialization is somewhat difficult, as off the shelf exploits rarely work without changes or tweaks to …

Cross-site scripting XSS

OWASP The more of these documents that I have made I have realized that there is a pretty big difference between what you learn from PortSwigger and OWASP. I find that OWASP provides good foundational documentation of the vulnerabilities whereas PortSwigger shows you the practical side of the vulnerabilities. To start I am going to …

Security misconfiguration

All material regarding Security Misconfiguration will be provided to us by OWASP, We will start off just like the others looking at the threat agents and attack vectors. “Attackers will often attempt to exploit unpatched flaws or access default accounts, unused pages, unprotected files, and directories, etc to gain unauthorized access or knowledge of the …

Future Plans & Feedback

The site is almost at a total of 500 views, which doesn’t sound like a lot but means a lot to me. The more content I put out the more views the website gets. Getting this site to grow and maintain new information is something I do on the side, and I try and do …

Irked

Are you ready to hack Irked? For this box, I recommend that you finish blue, legacy, and lame beforehand to build up some base knowledge. This box is a little bit more advanced than the previous ones, and will require a few different techniques. Starting this box off, I ran an sv scan to get …