Hacking – category –
-
[EDB-1518] Privilege escalation using MySQL User Defined Function (UDF)! Linux PrivEsc Writeup Part 1 (Linux Privilege Escalation)
This time, we will try out "EDB-1518: Elevation of Privilege using MySQL User Defined Function" in Exploit Database. The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" The explanation is... -
[TryHackMe] Using Hydra, we tried to obtain website authentication information through a brute force attack! Hydra Writeup
This time, we will use a tool called Hydra to try brute force attacks and password list attacks. "TryHackMe-Nmap: https://tryhackme.com/room/hydra" Please note that the explanation is a spoiler. Installing Hydra First, let's start with Hydra's... -
[TryHackMe] I tried using Metasploit to escalate Windows privileges with a reverse shell! HackPark Writeup Part 2 CVE-2019-6714
This time, I'll try using Metasploit to even escalate privileges in Windows. Please note that the explanation is a spoiler. Preparation This article is now in Part 2... -
[TryHackMe] I tried brute force attack using Hydra! HackPark Writeup Part 1
This time, I'll be participating in a Room called HackPark on TryHackMe and trying a brute force attack using Hydra. Please note that the explanation is a spoiler. Preparation First... -
[TryHackMe] I tried using Nmap, a powerful network scanning tool! Nmap Writeup
This time, we will be taking on TryHackMe Room, which is based on how to use Nmap. Please note that the explanation is spoilers, as this is a spoiler. Preparation First, let's prepare. There are two tasks. ... -
[TryHackMe] OhSINT Writeup - Collect a lot of information from one image.
OhSINT stands for "open source intelligence," and is a method of obtaining new information by comparing and analyzing legally available information. For example, identifying addresses from images on social media and identifying schools are also types of OhSINT. This time... -
[steganography] I tried using Steghide to hide sensitive data from images!
Steganography is one of the techniques for hiding information. It is possible to embed and hide information in various data such as image data and audio data. While it is used for good things like digital watermarking, it is often misused, such as hiding malicious scripts... -
[CVE-2017-7494] Using the Metasploit Framework, I tried to infiltrate Stapler:1 due to a vulnerability in Samba.
We will show you how to infiltrate "STAPLER:1" published by Staper on VULNHUB using the Metasploit Framework. If you still have an environment with STAPLER:1, please refer to "Build an environment with STAPLER:1 on VirtualBox on Windows!" and try building it. Me... -
[VULNHUB] Create an environment for STAPLER: 1 on VirtualBox on Windows! Try studying CTF!
VULNHUB is a platform that publishes vulnerable virtual images, aimed at providing educational materials that allow you to have practical experiences in digital security, computer software, and network management. St... -
Set up file sharing folders with KALI LINUX and VirtualBox! Also, steps to make the mount permanent!
When creating a virtual machine with KALI LINUX installed in VirtualBox, there are many cases where you want to link files between the host (physical machine) and the guest (virtual machine). One way to exchange files between hosts and guests is to set up a shared folder...