Skip to content

IT-Security.top

Cyber Security Blog

IT-Security.top

Cyber Security Blog

  • Home
  • Resilient organization
  • Red Team&CTFs
  • Blue Team
  • whoami
Injection Privilege Escalation Red Team

HackTheBox – CozyHosting

Marceli 27 September 2023 No Comments
Resilient Organization

Next-Gen Firewall (NGFW) – selection & initial deployment

Marceli 28 August 2023 No Comments
Active Directory Red Team

HackTheBox – Active

Marceli 14 September 2022 No Comments
Active Directory Red Team

TryHackMe – Enumerating Active Directory

Marceli 31 August 2022 No Comments
Active Directory Red Team

TryHackMe – Breaching Active Directory

Marceli 30 August 2022 No Comments
CVE Enumeration Insecure Design Red Team

HackTheBox – Unified CTF walkthrough

Marceli 17 February 2022 No Comments

Port 8443 It looks like it is a Unify app vulnerable to Log2j - CVE-2021-44228 If app is facing public network you can check if site is vulnerable by testing…

Hashes Injection Insecure Design Privilege Escalation Red Team Weak configuration

HackTheBox – Vaccine CTF walkthrough

Marceli 12 February 2022 No Comments

Initial scan of Vaccine shown 3 open ports.

Enumeration Injection Insecure Design Privilege Escalation Red Team

HackTheBox – Oopsie CTF walkthrough

Marceli 11 February 2022 No Comments

Initial scan of “Oopsie”:

Enumeration Privilege Escalation Red Team Weak configuration

HackTheBox – Nibbles CTF walkthrough

Marceli 9 February 2022 No Comments

Initial scan:

Blue Team

Splunk BOTSv2 Dataset – TryHackMe Splunk 2 CTF Walkthrough

Marceli 26 July 2021 No Comments

In this exercise, you assume the persona of Alice Bluebird, the analyst who successfully assisted Wayne Enterprises and was recommended to Grace Hoppy at Frothly (a beer company) to assist…

Enumeration Privilege Escalation Red Team

TryHackMe – Retro CTF walkthrough

Marceli 15 July 2021 No Comments

Retro is typical blackbox CTF. Initial nmap scan shows 2 open ports:

Buffer Overflow Enumeration Privilege Escalation Red Team Reverse engineering

TryHackMe – Brainpan 1 CTF walkthrough

Marceli 14 July 2021 No Comments

This box is quite similar to Brainstorm which i did previously. Initial scan shows 2 open tcp ports: 9999 and 10000

Buffer Overflow Enumeration Red Team Reverse engineering

TryHackMe – Brainstorm CTF walkthrough

Marceli 5 July 2021 1 Comment

The purpose of this CTF is to reverse engineer a chat program and write a script that will exploit a Windows machine. It is a great example of buffer overflow,…

Enumeration Red Team Reverse engineering

TryHackMe — Mr Robot CTF walkthrough

Marceli 7 June 2021 No Comments

Enumeration – nmap

Hashes Tutorial

Hash cracking – quick guide

Marceli 8 May 2021 No Comments

Hash functions are quite different from encryption. There is no key, and it’s meant to be impossible (or very difficult) to go from the output back to the input. More…

Posts pagination

1 2 3 4

« Previous Page — Next Page »

Categories

Archives

  • 2023
  • 2022
  • 2021

You Missed

Injection Privilege Escalation Red Team

HackTheBox – CozyHosting

Resilient Organization

Next-Gen Firewall (NGFW) – selection & initial deployment

Active Directory Red Team

HackTheBox – Active

Active Directory Red Team

TryHackMe – Enumerating Active Directory

IT-Security.top

Cyber Security Blog

Copyright © All rights reserved | Blogus by Themeansar.