top of page
​
Search
Winifred
Aug 18, 20242 min read
HTB Academy: "Footprinting Lab - Hard" Walkthrough
Walkthrough for HTB Academy's Footprinting Lab (Hard Difficulty)
266 views0 comments
z3r0day_504
Sep 4, 20231 min read
Exploiting MS08-067 without Metasploit (HTB Legacy Walkthrough)
Enumeration First we run a generic nmap scan against the box to see what ports and services are available: We see that SMB is open, let's...
158 views0 comments
z3r0day_504
Aug 28, 20233 min read
Exploiting MS17-010 without Metasploit (HTB Blue Walkthrough)
Enumeration First we run an nmap scan against the target: Here we can see that port 445 (SMB) is open. We also see the computer name as...
161 views0 comments
z3r0day_504
Mar 6, 20232 min read
HTB Walkthrough: Chatterbox
Enumeration Running an nmap scan shows which ports are open and available: We see that there are ports running unknown services. Google...
121 views0 comments
z3r0day_504
Feb 20, 20232 min read
HTB Walkthrough: Devel
Enumeration Start with an nmap scan: From there we can discern that ports 21 and 80 are open. Gaining Access Check port 21 (FTP) for...
70 views0 comments
z3r0day_504
Feb 7, 20233 min read
HTB Walkthrough: Photobomb
Enumeration Upon enumerating with nmap we discover that ports 22 and 80 are open. When we navigate to the IP address via the browser, we...
27 views0 comments
z3r0day_504
Jan 16, 20233 min read
HTB Walkthrough: Precious
Enumeration To start working on this box, we'll first run an nmap scan against it to see what ports are open and what services are...
1,049 views0 comments
z3r0day_504
Dec 19, 20223 min read
Mimikatz 101
If you're new to the infosec/offsec space, the name "Mimikatz" may be foreign or quite vaguely familiar; however, for the folks that have...
273 views0 comments
z3r0day_504
Nov 28, 20223 min read
HTB Walkthrough: Shoppy
Tools and Resources NoSQLMap: https://github.com/codingo/NoSQLMap GTFOBins: https://gtfobins.github.io/ PayloadAllTheThings:...
180 views0 comments
z3r0day_504
Jul 25, 20222 min read
Precious Metals: Golden and Silver Ticket Attacks
If you're in the realm of cybersecurity, you're probably already aware of the fact that most if not all processes and architectures are...
198 views0 comments
Home: Subscribe
CONTACT
bottom of page