TryHackMe Silver Platter
#Silver Platter Think you’ve got what it takes to outsmart the Hack Smarter Security team? They claim to be unbeatable, and now it’s your chance to prove them wrong. Dive into their web server, fin...
#Silver Platter Think you’ve got what it takes to outsmart the Hack Smarter Security team? They claim to be unbeatable, and now it’s your chance to prove them wrong. Dive into their web server, fin...
#LookUp Test your enumeration skills on this boot-to-root machine. ###Initial recon cant find anything intersting inorder to load the site add lookup.thm to /etc/hosts <ip> lookup.thm ...
#Crocc Crew ──(kali㉿kali)-[~/tmp] └─$ rustscan -a 10.10.61.167 -- -sCV .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \|...
#Cryptography Basics #Task 2 What is the standard required for handling credit card information? PCI DSS #Task3 What do you call the encrypted plaintext? ciphertext What do you call the proces...
#TryHackMe CyberChef The Basics ##Task 3 In which area can you find “From Base64”? operations Which area is considered the heart of the tool? Recipe ##Task 4 At which step would you determine,...
#WhiteRose In my journey through the TryHackMe Whiterose challenge, I kicked things off with thorough enumeration using Rustscan and Nmap to uncover active ports and services on the target. This le...
#PWN101 Beginner-level binary exploitation challenges focus on learning basic vulnerabilities like buffer overflows, format string attacks, and return-to-libc, teaching how to manipulate memory an...
This writeup covers my walkthrough of the TryHackMe ‘Undiscovered’ CTF challenge, where I used a variety of enumeration and brute-forcing techniques to gain access to the target system. Starting wi...
A backup file containing all user information was discovered on the web server. One user from the backup, lparker, had pre-authentication disabled, allowing the hash to be cracked and a shell acces...
#Clocky Explore my comprehensive TryHackMe walkthrough on the ‘Clocky’ CTF challenge, where I dive into key reconnaissance steps, detailed directory enumeration, endpoint analysis, and various expl...