Posts by Tag

TryHackMe

Recovery : TryHackMe

3 minute read

Here is a hint if you want to try it on your own. Reverse engineer the fixutil binary. It modifies a library file. Reverse engineer that library file as well.

Tmux : TryHackMe

1 minute read

tmux is a terminal multiplexer. It lets you switch easily between several programs in one terminal, detach them (they keep running in the background) and rea...

Back to Top ↑

Linux Privilege Escalation

Academy : HTB writeup

6 minute read

Hack The Box’s easy box with web enumeration, vulnerable website, audit logs

Back to Top ↑

Writeup

Academy : HTB writeup

6 minute read

Hack The Box’s easy box with web enumeration, vulnerable website, audit logs

Back to Top ↑

linux

Recovery : TryHackMe

3 minute read

Here is a hint if you want to try it on your own. Reverse engineer the fixutil binary. It modifies a library file. Reverse engineer that library file as well.

Tmux : TryHackMe

1 minute read

tmux is a terminal multiplexer. It lets you switch easily between several programs in one terminal, detach them (they keep running in the background) and rea...

Back to Top ↑

Docker

First Docker Container

1 minute read

From the first part of this series, we are clear that why we need containers and how container differ from virtual machines.

Getting started with Docker

8 minute read

Before getting to know what docker is, let’s start by why docker is used and why it is so popular.

Back to Top ↑

HTB

Academy : HTB writeup

6 minute read

Hack The Box’s easy box with web enumeration, vulnerable website, audit logs

Back to Top ↑

Privilege Escalation

Back to Top ↑

Vulnerable Web Application

Academy : HTB writeup

6 minute read

Hack The Box’s easy box with web enumeration, vulnerable website, audit logs

Back to Top ↑

Linux

Bandit : OverTheWire

5 minute read

Bandit This is my solution to the bandit war game on over the wire. Bandit tests your linux skills. Feel free to try it yourself here.

Back to Top ↑

OverTheWire

Bandit : OverTheWire

5 minute read

Bandit This is my solution to the bandit war game on over the wire. Bandit tests your linux skills. Feel free to try it yourself here.

Back to Top ↑

Bandit

Bandit : OverTheWire

5 minute read

Bandit This is my solution to the bandit war game on over the wire. Bandit tests your linux skills. Feel free to try it yourself here.

Back to Top ↑

SQL Injection

Back to Top ↑

THM

Back to Top ↑

Virtualization

Getting started with Docker

8 minute read

Before getting to know what docker is, let’s start by why docker is used and why it is so popular.

Back to Top ↑

Container

First Docker Container

1 minute read

From the first part of this series, we are clear that why we need containers and how container differ from virtual machines.

Back to Top ↑

HAL

First Docker Container

less than 1 minute read

Hardware Abstraction Layer HAL (Hardware Abstraction Layer or rather Hardware Annotation Library) is a software subsystem for UNIX-like operating systems pro...

Back to Top ↑

DBUS

First Docker Container

less than 1 minute read

Hardware Abstraction Layer HAL (Hardware Abstraction Layer or rather Hardware Annotation Library) is a software subsystem for UNIX-like operating systems pro...

Back to Top ↑

Kernel Modules

First Docker Container

less than 1 minute read

Hardware Abstraction Layer HAL (Hardware Abstraction Layer or rather Hardware Annotation Library) is a software subsystem for UNIX-like operating systems pro...

Back to Top ↑

File Management

Back to Top ↑

Archiving

Back to Top ↑

Compression

Back to Top ↑

Vulnerability Exploit

Back to Top ↑

memcache

Back to Top ↑

Web

Back to Top ↑

tmux

Tmux : TryHackMe

1 minute read

tmux is a terminal multiplexer. It lets you switch easily between several programs in one terminal, detach them (they keep running in the background) and rea...

Back to Top ↑

SQLMap

Back to Top ↑

Flask

Back to Top ↑

XSS

Back to Top ↑

tar

Back to Top ↑

File Upload Vulnerability

Back to Top ↑

Password Bruteforce

Back to Top ↑

Custom Wordlist

Back to Top ↑

Sudo CVE

Back to Top ↑

Splunkd

Back to Top ↑

SSTI

Back to Top ↑

piHole

Back to Top ↑

SSH Tunnelling

Back to Top ↑

rsync

Back to Top ↑

XPATH injection

Back to Top ↑

403Bypass

Back to Top ↑

enumeration

Back to Top ↑

Android

Back to Top ↑

Static Analysis

Back to Top ↑

Mobile

Back to Top ↑

Reversing

Back to Top ↑

CTF

Back to Top ↑

git

Back to Top ↑

HTTP Header

Back to Top ↑

Obfuscation

Back to Top ↑

steghide

Back to Top ↑

JS

Back to Top ↑

reversing

Recovery : TryHackMe

3 minute read

Here is a hint if you want to try it on your own. Reverse engineer the fixutil binary. It modifies a library file. Reverse engineer that library file as well.

Back to Top ↑

recovery

Recovery : TryHackMe

3 minute read

Here is a hint if you want to try it on your own. Reverse engineer the fixutil binary. It modifies a library file. Reverse engineer that library file as well.

Back to Top ↑

cipher

Back to Top ↑

python

Back to Top ↑

Port Knocking

Back to Top ↑

SSRF

Back to Top ↑

Command Injection

Back to Top ↑

Chaining

Back to Top ↑

Audit Log

Academy : HTB writeup

6 minute read

Hack The Box’s easy box with web enumeration, vulnerable website, audit logs

Back to Top ↑

composer

Academy : HTB writeup

6 minute read

Hack The Box’s easy box with web enumeration, vulnerable website, audit logs

Back to Top ↑

Sudo Path Injection

Back to Top ↑

Cron

Back to Top ↑

XXE

Back to Top ↑

Host Header Injection

Back to Top ↑

LFI2RCE

Back to Top ↑

wordpress

Back to Top ↑

path injection

Back to Top ↑

suid

Back to Top ↑