Cyber Weapons – category –
-
[Memo] What to do if Connection closed by xx.xx.xx.xx.xx port 22 occurs when you connect to TryHackMe.
I wanted to connect to SSH using TryHackMe, but I struggled to do so, so I'll leave it as a memo. If anyone is suffering from the same problem, I think this might be helpful. expecting If processing is stopped with SSH2_MSG_KEX_DH_GEX_GROUP, check the event... -
[TryHackMe] Privilege escalation using the environment variables LD_PRELOAD and LD_LIBRARY_PATH! Linux PrivEsc Writeup Part 4
This time, we will try escalating privileges using the LINUX environment variables "LD_PRELOAD" and "LD_LIBRARY_PATH". The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" This article is about Par... -
[TryHackMe] Improvement of privilege using GTFOBins! Linux PrivEsc Writeup Part 3
This time, we will try escalating privileges using "GTFOBins." The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" This article is part 3. TryHackMe for Linux PrivEsc... -
[TryHackMe] Brute-force attacks and escalating privileges using ssh2john.py in Hydra! Basic Pentesting Writeup
This time, we will study the basics of penetration tests using TryHackMe's Basic Pentesting. Please note that the explanation is a spoiler for "TryHackMe-Basic Pentesting: https://tryhackme.com/room/basicpentestingjt". Preparation First, target... -
[TryHackMe] Improvement of privileges through vulnerable file permissions in Linux! Linux PrivEsc Writeup Part 2 (Linux Privilege Escalation)
This time, we will try "Elevation of privileges using vulnerable file permissions in Linux." The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" This article is in Part 2. TryHack... -
[EDB-1518] Privilege escalation using MySQL User Defined Function (UDF)! Linux PrivEsc Writeup Part 1 (Linux Privilege Escalation)
This time, we will try out "EDB-1518: Elevation of Privilege using MySQL User Defined Function" in Exploit Database. The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" The explanation is... -
[TryHackMe] Using Hydra, we tried to obtain website authentication information through a brute force attack! Hydra Writeup
This time, we will use a tool called Hydra to try brute force attacks and password list attacks. "TryHackMe-Nmap: https://tryhackme.com/room/hydra" Please note that the explanation is a spoiler. Installing Hydra First, let's start with Hydra's... -
[TryHackMe] I tried using Metasploit to escalate Windows privileges with a reverse shell! HackPark Writeup Part 2 CVE-2019-6714
This time, I'll try using Metasploit to even escalate privileges in Windows. Please note that the explanation is a spoiler. Preparation This article is now in Part 2... -
[TryHackMe] I tried brute force attack using Hydra! HackPark Writeup Part 1
This time, I'll be participating in a Room called HackPark on TryHackMe and trying a brute force attack using Hydra. Please note that the explanation is a spoiler. Preparation First... -
[TryHackMe] I tried using Nmap, a powerful network scanning tool! Nmap Writeup
This time, we will be taking on TryHackMe Room, which is based on how to use Nmap. Please note that the explanation is spoilers, as this is a spoiler. Preparation First, let's prepare. There are two tasks. ...