TryHackMe – tag –
-
[TryHackMe] Brute-force attacks and escalating privileges using ssh2john.py in Hydra! Basic Pentesting Writeup
This time, we will study the basics of penetration tests using TryHackMe's Basic Pentesting. Please note that the explanation is a spoiler for "TryHackMe-Basic Pentesting: https://tryhackme.com/room/basicpentestingjt". Preparation First, target... -
[TryHackMe] Improvement of privileges through vulnerable file permissions in Linux! Linux PrivEsc Writeup Part 2 (Linux Privilege Escalation)
This time, we will try "Elevation of privileges using vulnerable file permissions in Linux." The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" This article is in Part 2. TryHack... -
[EDB-1518] Privilege escalation using MySQL User Defined Function (UDF)! Linux PrivEsc Writeup Part 1 (Linux Privilege Escalation)
This time, we will try out "EDB-1518: Elevation of Privilege using MySQL User Defined Function" in Exploit Database. The target machine uses the Room below of TryHackMe. "TryHackMe-Linux PrivEsc: https://tryhackme.com/room/linuxprivesc" The explanation is... -
[TryHackMe] Using Hydra, we tried to obtain website authentication information through a brute force attack! Hydra Writeup
This time, we will use a tool called Hydra to try brute force attacks and password list attacks. "TryHackMe-Nmap: https://tryhackme.com/room/hydra" Please note that the explanation is a spoiler. Installing Hydra First, let's start with Hydra's... -
[TryHackMe] I tried brute force attack using Hydra! HackPark Writeup Part 1
This time, I'll be participating in a Room called HackPark on TryHackMe and trying a brute force attack using Hydra. Please note that the explanation is a spoiler. Preparation First... -
[TryHackMe] I tried using Nmap, a powerful network scanning tool! Nmap Writeup
This time, we will be taking on TryHackMe Room, which is based on how to use Nmap. Please note that the explanation is spoilers, as this is a spoiler. Preparation First, let's prepare. There are two tasks. ... -
[TryHackMe] OhSINT Writeup - Collect a lot of information from one image.
OhSINT stands for "open source intelligence," and is a method of obtaining new information by comparing and analyzing legally available information. For example, identifying addresses from images on social media and identifying schools are also types of OhSINT. This time... -
[steganography] I tried using Steghide to hide sensitive data from images!
Steganography is one of the techniques for hiding information. It is possible to embed and hide information in various data such as image data and audio data. While it is used for good things like digital watermarking, it is often misused, such as hiding malicious scripts...