Β Enumeration sudo nmap -sV -sC <target-ip> Β Β βββ(rootγΏkali)-[/home/local_host/Desktop/CTF/simple_ctf] | ββ# nmap -sV -sC 10.10.54.91 Starting Nmap 7.93 ( https://nmap.or...
Setting-up Task 1: Deploy the machine and connect to our network Task 2: Deploy the machine and connect to our network Reconnaissance sudo nmap -sV -sC -O <ip-addr> Results: Starting Nm...
HackTheBox / Meow - STARTING-POINT Setting-up VPN step-1: Download the starting-point vpn file step-2: Open terminal and navigated to the downloaded directory (cd ~/Downloads) step-3: sudo ...
Β What the shell? Β An introduction to sending and receiving (reverse/bind) shells when exploiting target machines. Task 3 π’note: Task 1,2 have no answer needed Q: Which type of shell con...
Cybersecurity Resources βοΈ Overview Want to learn more about cybersecurity? Discover cybersecurity resources: anything from cybersecurity websites to podcasts, industry events, and organizations. ...
Bug Bounty Checklist for Web App This checklist may help you to have a good methodology for bug bounty hunting Table of Contents Recon on wildcard domain Single domain Information Gat...
Β π Overview 1 Escalating via Kernel Exploits 2 Escalation by File permission & Passwords OLD PASSWORDS IN /ETC/SECURITY/OPASSWD LAST EDITED FILES IN MEMORY PASSWORDS FIND SENSIT...
A new version of content is available.