The Relevant briefing mentiones that everything can be completed without Metasploit. Since OSCP only allows very limited use of the Metasploit Framework I took this as a challenge. Below the releva...
Cheat Sheet
Cracking hash John the Ripper When using a custom format we can specify the hash algoritm(s) and the format with the --format parameter. Example cipher (SHA512$salt): 6d05358f090eea56a238af02e47d...
THM - Daily Bugle
Naturally, as a blue teamer I have the urge to identify which TTPs have been used during an attack. So from now on, all my write ups will include this by utilizing the MITRE ATT&CK framework. I...
THM - Alfred
Initial access What do Batman and Jenkins have in common? Check the page source code for the answer. Running nmap reveals that the following three TCP ports listed below are open. Visiting the web...
THM - Steel Mountain
Introduction Steel Mountain refers to the data security firm where the protagonist Eliot broke into in the TV show Mr. Robot. Opening a browser to this machine shows a simple html website showing a...
- 1
- 1 / 1