Supposed to be Intro The code snippet below and its explanations cover various useful Windows functions and APIs that can be implemented using the C++ language for system programming purposes. Her...
Red Teaming - Pivoting Perspectives
Alright, imagine this hilarious little memo I wrote down for my future self: “Yo, Future Me! I made this easy-peasy guide for ya, just in case you hack into that machine someday. No hacking stuff h...
Red Teaming - Havoc C2 Team Server and Profiles
The Team Server The C2 Profiles You can probably refer to the Havoc’s documentation to understand the basic syntax of the profile in detail. I will try to explain the default havoc profile which i...
Red Teaming - Havoc C2
Introduction C2 frameworks, also known as command and control, enables red teamers to control and communicate with compromised systems. Havoc is a modern and malleable post-exploitation command and...
HTB - PC
HTB — PC A detailed walkthrough for solving PC on HTB. The box contains vulnerability like SQL Injection, Plaintext credential on the database, and privilege escalation through PyLoad. Enumerat...
HTB - MonitorsTwo
HTB — MonitorsTwo A detailed walkthrough for solving MonitorsTwo on HTB. The box contains vulnerability like default credentials, CVE-2022–46169 Cacti Remote Code Execution and Privilege Escalatio...
HTB - Only4You
HTB — Only4You A detailed walkthrough for solving Only4You on HTB. The box contains vulnerability like File Inclusion, Weak Credentials, Cypher Injection, Command Injection and privilege escalatio...
HTB - Busqueda
HTB — Busqueda A detailed walkthrough for solving Busqueda on HTB. The box contains vulnerability like Python Code Injection, Hardcoded Credentials, Credential Reuse, and privilege escalation thro...
HTB - Socket
HTB — Socket A detailed walkthrough for solving Socket Box on HTB. The box contains vulnerability like SQLite Injection, Weak Hashing and privilege escalation through SUDO shell scaping. Enumer...
HTB - Stocker
HTB — Stocker It is an easy machine in Hack The Box. It contains vulnerabilities like NoSQL Injection, File Inclusion on PDF conversion and Credential reuse. Enumeration NMAP Disable the ping...