Valentine HackTheBox Notes

Valentine This box consists of a fair amount of rabbit holes that I will just ignore for the most part to avoid this report being super long.   The first thing I always do is run an nmap scan. I found 3 open ports, http, https, and ssh. This is great, web servers are fun.... Continue Reading →

Aragog HackTheBox Notes

Nmap -sV -T5 10.10.10.78 PORT   STATE SERVICE VERSION 21/tcp open  ftp vsftpd 3.0.3 22/tcp open  ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) 80/tcp open  http Apache httpd 2.4.18 ((Ubuntu)) Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel   Running dirbuster with medium wordlist   10.10.10.78/hosts.php => There are 4294967294 possible hosts for This is... Continue Reading →

Get A Password Manager!

Welcome to the 21st century! Remember back in the day when we would write down a password so we wouldn’t have to memorize it? Well let’s do that again! Just this time we are going to do it better. So a password manager is exactly what it sounds like. It is an application used to... Continue Reading →

Rooting the Coffee Machine

Eccellenza Touch Coffee Maker Rooting the Coffee Machine So you get a new coffee machine. It has network capabilities…. and It  has a USB port… Obviously this means you should hack it. The Process: The steps we took sort of went like this.Go make cup of Coffee Notice login interface while making coffee. Google default... Continue Reading →

OverTheWire Bandit Levels Explained

OverTheWire These were basically just my notes from each level that I figured I'd post just in case other people got stuck on a level or if I wanted to look back to these. Overall completing all of the levels was certainly a grind but there were plenty of nights where I just couldn't stop... Continue Reading →

Security+ SY0-501 by Darril Gibson

Security+ Get Certified Get Ahead SY0-501 Study Guide by Darril Gibson The day has come, I have, for the first time, read an entire book, since probably the third grade! You may hold the applause. This book was probably the single best source of knowledge I have come upon so far in my short life.... Continue Reading →

What’s an SQL Injection?

SQL Injection What is an SQL injection? URL encoding Types of SQL injections How basic SQL injections work   What is an SQL injection? This code injection technique is used to attack data-driven applications. Attackers can insert SQL statements into an entry field on a vulnerable website for execution. A common reason for using this... Continue Reading →

Understanding Graylog and Log Management

Log Management Tools (Graylog) As you probably know by now keeping track of logs and alerts is a crucial part of security. Therefore, having tools that allows administrators to create an efficient way to manage their logs. The tool we are going to discuss in this post is Graylog, but first let’s look at Log... Continue Reading →

Create a website or blog at WordPress.com

Up ↑