-
Blue - Practical Ethical Hacking
Today we are going to solve TCM Security’s Practical Ethical Hacking Course Blue machine. This machine is part of the intermediate capstone of the course, in this write-up I’ll focus on covering multiple exploitation and privilege escalation techniques, from initial reconnaissance to gaining administrator privileges. The goal of this article...
-
Monitors - Hack The Box
Today we will be solving Hack The Box’s Monitors machine. It is a hard-level Linux machine, as listed on the platform. Despite its difficulty, there’s no reason to feel intimidated, as it covers various techniques and vulnerabilities, making it an excellent opportunity to learn and practice, all detailed step by...
-
Devel - Hack The Box
This time we are going to solve Hack The Box’s Devel machine. It is an easy-level Windows machine, both in terms of exploitation and privilege escalation. Reconnaissance Phase First, we’re going to launch an ICMP traceroute to check if the machine is active. ping -c 1 10.10.10.5 Once we verify...
-
Lame - Hack The Box
Today we will be solving Hack The Box’s Lame machine. It is an easy-level Linux machine, both in terms of exploitation and privilege escalation. This machine allows us to exploit it through two potential paths, one of which requires post-exploitation. Despite its low difficulty, there are multiple methods to perform...
-
Forest - Hack The Box
Today we are going to solve Hack The Box’s Forest machine. It is a Windows machine with a medium difficulty level for intrusion, and medium for privilege escalation as listed on the platform. Reconnaissance Phase First, we’re going to launch an ICMP traceroute to check if the machine is active....