Reversing Challenge: Snake HTB

To solve this quickly please look at the method stated at the bottom of the page. Firstly we download the zip from htb and unzip this to obtain the file we will be reversing ‘snake.py’. I will be completing this challenge using kali linux x64 but it should be very similar on any OS with... Continue Reading →

Poison HackTheBox Notes

As I continue to post my notes for retired boxes you will likely notice a drastic increase in detail. A few boxes were completed when I was just getting into cyber security and since then I have learned a lot in regards to documentation. Simply based off of the name here we can determine this... Continue Reading →

Celestial HackTheBox Notes

This box isn’t too bad and was actually pretty educational. First we started off with an nmap scan, noticing only one port open “3000”. Using the flag -sV we can use banner grabbing to determine what service is running on the port. We then found out it was node.js and a web host. So we... Continue Reading →

Valentine HackTheBox Notes

Valentine This box consists of a fair amount of rabbit holes that I will just ignore for the most part to avoid this report being super long.   The first thing I always do is run an nmap scan. I found 3 open ports, http, https, and ssh. This is great, web servers are fun.... Continue Reading →

Aragog HackTheBox Notes

Nmap -sV -T5 10.10.10.78 PORT   STATE SERVICE VERSION 21/tcp open  ftp vsftpd 3.0.3 22/tcp open  ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) 80/tcp open  http Apache httpd 2.4.18 ((Ubuntu)) Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel   Running dirbuster with medium wordlist   10.10.10.78/hosts.php => There are 4294967294 possible hosts for This is... Continue Reading →

Create a website or blog at WordPress.com

Up ↑