TryHackMe – tag –
-
[CVE-2015-3306] I enumerated the shared Samba, manipulate a vulnerable version of proftpd, and escalated privileges by manipulating path variables! TryHackMe Kenobi Writeup
This time, we will enumerate shared Samba, manipulate vulnerable versions of proftpd, and escalate privileges by manipulating path variables. "TryHackMe-Kenobi: https://tryhackme.com/room/kenobi" Please note that the explanation is a spoiler. Preparation First, start with "Start Machine... -
[TryHackMe] We conducted packet analysis using wireshark to investigate the intrusion of ssh-backdoor! Overpass2 Writeup
This time, we will use wireshark to analyze packets and analyze ssh-backdoor intrusions. Please note that the explanation is a spoiler for "TryHackMe-Overpass2-Hacked: https://tryhackme.com/room/overpass2hacked". Preparation First, "Download Task... -
[CVE-2018-16763] fuel CMS 1.4.1 - I converted Remote Code Execution (1) to python 3 and hacked it! TryHackMe Ignite Writeup
This time, we will try to hack fuel CMS using the vulnerability in CVE-2018-16763. The target machine uses TryHackMe's Ignite. "TryHackMe-Ignite: https://tryhackme.com/room/ignite" Please note that the explanation is a spoiler. advance... -
[TryHackMe] I used SSH2John to extract the hash from the private key and hacked the password with John the Ripper! Overpass Writeup
This time, we will use SSH2John to extract the hash from the private key using TryHackMe's Overpass, and then identify the password using John the Ripper. Overpass is even escalated to privileges, so I hope you can do it until the end! "TryHackMe-Overpass: https://t... -
[TryHackMe] I tried infiltrating a Windows machine with a ret2esp attack (Buffer Overflow)! Brainstorm Writeup
This time, we will try out the "ret2esp attack," one of the buffer overflow attacks. Please note that the explanation is a spoiler for "TryHackMe-Brainstorm: https://tryhackme.com/room/brainstorm". Deploy Machine and Scan Network (machine distribution... -
[CVE-2019-9053] I tried hacking it using the SQL injection vulnerability in CMS Made Simple! (Python3) TryHackMe Simple CTF Writeup
This time, we will take advantage of the CVE-2019-9053: CMS Made Simple's SQL injection vulnerability to infiltrate the target machine and even escalate privileges. The target machine uses "TryHackMe-Simple CTF: https://tryhackme.com/room/easyctf". The explanation is about the topic... -
[TryHackMe] I tried command injection using Python's Eval() function! Devie Writeup
This time, I tried command injection using Python's Eval() function. It also includes command injection as a Writeup for the Room called Devie from TryHackMe, so please take a look. "TryHackMe-: https://tryhackme.com/room/devie... -
[TryHackMe] I actually tried Buffer Overflow! Buffer Overflows Writeup
This time, we'll try out Buffer Overflow. Building an environment is also difficult, so I'll be studying at the Room below on TryHackMe. "TryHackMe-Buffer Overflows: https://tryhackme.com/room/bof1" Please note that the explanation is a spoiler. Introd... -
[TryHackMe] Hacking Windows machines using MS17-010 (CVE-2017-0143)! Blue Writeup
This time, we will try hacking Windows machines using TryHackMe's Room "Blue". "TryHackMe-Blue: https://tryhackme.com/room/blue" Please note that the explanation is a spoiler. Recon First, select "Start Machine" and... -
[TryHackMe] Biohazard CTF Writeup! A detailed explanation in line with the flow!
This time, we will try out CTF based on TryHackME's Resident Evil. This is my first time doing CTF like a game, so I'm also curious to see what it will be like! "TryHackMe-Biohazard: https://tryhackme.com/room/biohazard" The explanation is a spoiler, so be careful...