Introduction Hello, friend. It’s been a while. The internet has been an ever-expanding and evolving technology that has become a critical part of our lives. As the world becomes more digitalized, so does the risk from external threats to our system and the security of our data. To combat this is a community of professions, …
HTB Previse
Hack The Box walkthrough IP address: 10.10.11.104 Welcome to Previse write up! This box is a little tricky on user flag but it forces you to think out of bounds. User own Let’s start with nmap using the following options: -sV for version detection; -O for operating system detection. The latest option requires root privileges …
Knife
Hey, this is actually my 1st HTB box write-up as well as box. It is actually an easy marked box. After completing some easy boxes, I will move to those boxes which actually are relevant to writing pentesting reports. Actually, I was ready to make a pentesting report in this room, but this room is …
Intro to Modbus
What Is It, How It Works, and Vulnerabilities & Scenario Hello HackHouse family! If you came to learn about the Modbus protocol, how it’s used, and how it has been attacked, you’re in the right place. This article is intended for beginners in the ICS (industrial control systems) security arena, as I am one myself. …
Real world: IR Story: No Turkey for you!!
Horror stories always begin with “it was a dark and stormy night,” with scary imagery meant to spark the imagination. Unfortunately for the client calling us on the day before Thanksgiving, this is not a tale written by Bram Stoker or the Brothers Grimm. It was November 27th, 2019, and we were all getting ready …

