Cyber Weapons – category –
-
Cyber Weapons
[Memo] What to do if Connection closed by xx.xx.xx.xx.xx port 22 occurs when you connect to TryHackMe.
I wanted to connect to SSH using TryHackMe, but I struggled to do so, so I'll leave it as a memo. If anyone is suffering from the same problem, I think this might be helpful. expecting If processing is stopped with SSH2_MSG_KEX_DH_GEX_GROUP, check the event... -
Cyber Weapons
[TryHackMe] Privilege escalation using the environment variables LD_PRELOAD and LD_LIBRARY_PATH! Linux PrivEsc Writeup Part 4
This time, we will try escalating privileges using the LINUX environment variables "LD_PRELOAD" and "LD_LIBRARY_PATH". The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" This article is about Par... -
Cyber Weapons
[TryHackMe] Improvement of privilege using GTFOBins! Linux PrivEsc Writeup Part 3
This time, we will try escalating privileges using "GTFOBins." The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" This article is part 3. TryHackMe for Linux PrivEsc... -
Cyber Weapons
[TryHackMe] Brute-force attacks and escalating privileges using ssh2john.py in Hydra! Basic Pentesting Writeup
This time, we will study the basics of penetration tests using TryHackMe's Basic Pentesting. Please note that the explanation is a spoiler for "TryHackMe-Basic Pentesting: https://tryhackme.com/room/basicpentestingjt". Preparation First, target... -
Cyber Weapons
[TryHackMe] Improvement of privileges through vulnerable file permissions in Linux! Linux PrivEsc Writeup Part 2 (Linux Privilege Escalation)
This time, we will try "Elevation of privileges using vulnerable file permissions in Linux." The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" This article is in Part 2. TryHack... -
Cyber Weapons
[EDB-1518] Privilege escalation using MySQL User Defined Function (UDF)! Linux PrivEsc Writeup Part 1 (Linux Privilege Escalation)
This time, we will try out "EDB-1518: Elevation of Privilege using MySQL User Defined Function" in Exploit Database. The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" The explanation is... -
Cyber Weapons
[TryHackMe] Using Hydra, we tried to obtain website authentication information through a brute force attack! Hydra Writeup
This time, we will use a tool called Hydra to try brute force attacks and password list attacks. "TryHackMe-Nmap: https://tryhackme.com/room/hydra" Please note that the explanation is a spoiler. Installing Hydra First, let's start with Hydra's... -
Cyber Weapons
[TryHackMe] I tried using Metasploit to escalate Windows privileges with a reverse shell! HackPark Writeup Part 2 CVE-2019-6714
This time, I'll try using Metasploit to even escalate privileges in Windows. Please note that the explanation is a spoiler. Preparation This article is now in Part 2... -
Cyber Weapons
[TryHackMe] I tried brute force attack using Hydra! HackPark Writeup Part 1
This time, I'll be participating in a Room called HackPark on TryHackMe and trying a brute force attack using Hydra. Please note that the explanation is a spoiler. Preparation First... -
Cyber Weapons
[TryHackMe] I tried using Nmap, a powerful network scanning tool! Nmap Writeup
This time, we will be taking on TryHackMe Room, which is based on how to use Nmap. Please note that the explanation is spoilers, as this is a spoiler. Preparation First, let's prepare. There are two tasks. ...
