February 11, 2025 |
Hello everyone, I am logging here the second day of my 30 days challange. Today, I was not able to read much from the book however, I am happy to share with you all a bash tool which can automate you to check whether it is suspicious or not based on the virustotal engine. By …
30 Days Challenge: Day 01
February 10, 2025
Tashi Delek everyone, I hope you all are doing well 🙂 I know the way how I present my blog doesn’t attract much people, and those who read my blogs were either my old friends or new friends who I have met you somewhere and I had shamelessly bragged about my blog. The quality of …
Exploiting Windows & Privilege Escalation from TryHackMe (ICE Room)
May 26, 2023
Recon NMAP SYN Scan sudo nmap -sS -p- 10.10.185.210 -Pn -o nmap.log For some reason, my nmap is taking a lot of time (perhaps I ran -p- it means to enumerate all 65535 ports). Anyway, I quickly ran rustscan to get the ports. rustscan -a 10.10.185.210 –range 1-65535 —-. .-. .-. .—-..—. .—-. .—. .–. …
Continue reading “Exploiting Windows & Privilege Escalation from TryHackMe (ICE Room)”
Steel Mountain with and without using Metasploit
May 25, 2023
In this room you will enumerate a Windows machine, gain initial access with Metasploit, use Powershell to further enumerate the machine and escalate your privileges to Administrator. If you don’t have the right security tools and environment, deploy your own Kali Linux machine and control it in your browser, with our Kali Room. Please note …
Continue reading “Steel Mountain with and without using Metasploit”
This is NullByte from vulhub
May 22, 2023
Overview: Target Machine IP Address: 192.168.56.122 My Machine IP Address: 192.168.56.117 Mission: Boot to Root Get to /root/proof.txt and follow the instructions. Level: Basic to intermediate. Description: Boot2root, box will get IP from dhcp, works fine with virtualbox&vmware. Hints: Use your lateral thinking skills, maybe you’ll need to write some code. Download: You can download …



