sinfuloath

Writeup

So this box is going to be a challenge if you have done the 4 previous boxes. It use’s a lot of the same methodology as the previous boxes, where you scan and use and exploit to gain a user shell. Getting root on this box is where this box is tricky, it isn’t difficult

Writeup Read More »

insecure deserialization

For this, we will be getting all of our information from OWASP which can be found here. We will start off by looking at the Threat agents & attack vectors along with the impact. “Threat Agents/Attack Vectors: Exploitation of deserialization is somewhat difficult, as off the shelf exploits rarely work without changes or tweaks to

insecure deserialization Read More »

Cross-site scripting XSS

OWASP The more of these documents that I have made I have realized that there is a pretty big difference between what you learn from PortSwigger and OWASP. I find that OWASP provides good foundational documentation of the vulnerabilities whereas PortSwigger shows you the practical side of the vulnerabilities. To start I am going to

Cross-site scripting XSS Read More »

Security misconfiguration

All material regarding Security Misconfiguration will be provided to us by OWASP, We will start off just like the others looking at the threat agents and attack vectors. “Attackers will often attempt to exploit unpatched flaws or access default accounts, unused pages, unprotected files, and directories, etc to gain unauthorized access or knowledge of the

Security misconfiguration Read More »

Irked

Are you ready to hack Irked? For this box, I recommend that you finish blue, legacy, and lame beforehand to build up some base knowledge. This box is a little bit more advanced than the previous ones, and will require a few different techniques. Starting this box off, I ran an sv scan to get

Irked Read More »

Scroll to Top
Scroll to Top