-
Prime: 1 – Walkthrough for OSCP Series
Prime: 1 is a challenging boot2root machine created by Suraj Pandey. It is designed for those who are preparing for the OSCP exam and is a great way to practice your penetration testing skills. In this blog post, I will walk you through the steps I took to root the machine, including: Performing a port…
-
LazySysAdmin – Vulnhub walkthrough
LazySysAdmin is an easy to crack VM. There are multiple ways to crack this machine, several ports and mis-configured services are present inside this box. The takeaway from this machine for me is to understand a service better and thinking simpler to get root privileges after we are able to exploit a badly configured service.…
-
Pwned Vulnhub Walkthrough
Pwned vulnhub challenge is an easy boot2root machine. One of the key take away from this machine is how you can escalate your privileges using Dockers. This blog post is about how I exploited this machine and what are the different tools I used to make that happen. Below are the requirements: You can get…
-
Hacking with Python Series: SSH bruteforcing script using Paramiko
This article will guide you to use paramiko library in Python to create an SSH bruteforcing Script. This script is similar to the script we have made on PXSSH, in case you haven’t seen that post, here is the link: http://www.anonhack.in/2018/06/hacking-with-python-series-ssh-bruteforcing-script-using-pxssh/ If you want to see the usage of paramiko before going through the below…
-
Hacking with Python Series: SSH bruteforcing script using PXSSH
This is a guide about how you can create SSH bruteforcing script using python. With this script you can bruteforce the username and password for SSH protocol. Below is the requirement and explanation to create this script. Library used: PXSSH Operating System: Kali [ The above library is not meant for windows ] You can…
-
JIS-CTF- Jordan Infosec Capture The Flag Challenge – Walkthrough
This article is a walk through on Jorder InfoSec CTF challenge: https://www.vulnhub.com/entry/jis-ctf-vulnupload,228/ This is a basic web challenge consisting of 5 flags. I ran it on Virtualbox with bridged mode. This app doesn’t require kali os. You can do it on windows as well. To find the vulnerable machines through your attacking machine: http://www.anonhack.in/2018/06/part-2-finding-the-ip-address-of-your-victim-in-your-vmware-hacking-lab-network/ Let’s see the…