Posts by Tag

Hackthebox

Open Source HackTheBox Writeup

4 minute read

In This Box we are facing interesting Stuff like Docker , git hooks and other stuff. first we got access to a docker in the machine by overwritting the appli...

Timelapse Hackthebox writeup

4 minute read

In this Box we are against a windows machine has the active directory service installed on it , we can list files on smb shares and access some shared folder...

Routerspace Hackthebox writeup

2 minute read

In this Box we are going to examine an android appliacation (apk) , and monitroing the requests by placing a proxy we will notice a request which we can mani...

Pandora Hackthebox writeup

3 minute read

In This Box we are going to enumerate the snmp port which will show user daniel with his password as a string in the output , we are going to login with ssh ...

Unicode Hackthebox writeup

5 minute read

In This medium Box we are playing with JWT Tokens in specific the jku Claim Misuse , which will let us login as admin account then we will use the Unicode En...

Backdoor Hackthebox writeup

3 minute read

In this easy Linux box we are facing a wordpress plugin vulnerable to directory traversal letting us reading some files on the system , brute forcing the /pr...

Shibboleth Hackthebox writeup

3 minute read

In this Box we are going to enumerate a udp port and dump the administrator hash ,then we will crack it , using these credentials we will login to the zabbix...

Secret Hackthebox writeup

4 minute read

In this Box we are going to follow documentation instructions to create a new user , will face sensitive data exposure will let us see a delete commit ,this ...

Devzat Hackthebox writeup

5 minute read

In this Hackthebox we will get a user access through a command injection in a vhost , then will make port forwarding to find a service that will give us the ...

Driver Hackthebox writeup

4 minute read

In this Box, we are going to abuse the ability of uploading the firmware of a shared printer and capture the NTLMv2 hash of a user on this machine. By cracki...

Bolt Hackthebox writeup

6 minute read

In this Hackthebox we will go analyze a docker img files and from there will find some juicy stuff will help us login to a vhost “demo” which has some functi...

Horizontall Hackthebox writeup

3 minute read

we got low-privilege access due to Vulnerable version of strapi CMS then got root access because of the Vulnerable Version of Laravel. main techniques used a...

Back to Top ↑

CTF

JustCTF Extra Safe Security Layers writeup

6 minute read

This Challenge is about exploiting cross site scripting with a strict CSP in place along with XSS Santizer and other restrictions , the interesting part in t...

meme generator challenge writeup

1 minute read

This challenge was in Blackhat CTF Qualifications 2022 and we have participated under the team 0xCha0s, we have managed to solve multiple challenges. this ch...

Flushed Emoji challenge Writeup

4 minute read

Lexington Informatics Tournament CTF CTF 2022 was held from the 22nd of July Until the 25th of the month , and we have participated under the team 0xcha0s, w...

Kryptos Support challenge Writeup

2 minute read

HTB Cyber Apocalypse CTF 2022 was held from the 14th of May Until the 19th of the month , and we have participated under the team 0xcha0s, we have managed to...

Hacker Ts challenge writeup

1 minute read

Nahamcon ctf 2022 was held from the 28th of April Until the 30th of the month , and we have participated under the team 0xcha0s. this challenge idea was pret...

SQL Tutor challenge writeup

3 minute read

DCTF 2022 was held from the 15th of April Until the 17th of the month , and we have participated under the team 0xcha0s, we have managed to solve multiple ch...

Back to Top ↑

SSRF

meme generator challenge writeup

1 minute read

This challenge was in Blackhat CTF Qualifications 2022 and we have participated under the team 0xCha0s, we have managed to solve multiple challenges. this ch...

Hacker Ts challenge writeup

1 minute read

Nahamcon ctf 2022 was held from the 28th of April Until the 30th of the month , and we have participated under the team 0xcha0s. this challenge idea was pret...

Back to Top ↑

Port forwarding

Devzat Hackthebox writeup

5 minute read

In this Hackthebox we will get a user access through a command injection in a vhost , then will make port forwarding to find a service that will give us the ...

Horizontall Hackthebox writeup

3 minute read

we got low-privilege access due to Vulnerable version of strapi CMS then got root access because of the Vulnerable Version of Laravel. main techniques used a...

Back to Top ↑

JWT

Unicode Hackthebox writeup

5 minute read

In This medium Box we are playing with JWT Tokens in specific the jku Claim Misuse , which will let us login as admin account then we will use the Unicode En...

Secret Hackthebox writeup

4 minute read

In this Box we are going to follow documentation instructions to create a new user , will face sensitive data exposure will let us see a delete commit ,this ...

Back to Top ↑

XSS

JustCTF Extra Safe Security Layers writeup

6 minute read

This Challenge is about exploiting cross site scripting with a strict CSP in place along with XSS Santizer and other restrictions , the interesting part in t...

Kryptos Support challenge Writeup

2 minute read

HTB Cyber Apocalypse CTF 2022 was held from the 14th of May Until the 19th of the month , and we have participated under the team 0xcha0s, we have managed to...

Back to Top ↑

port-forwarding

Open Source HackTheBox Writeup

4 minute read

In This Box we are facing interesting Stuff like Docker , git hooks and other stuff. first we got access to a docker in the machine by overwritting the appli...

Pandora Hackthebox writeup

3 minute read

In This Box we are going to enumerate the snmp port which will show user daniel with his password as a string in the output , we are going to login with ssh ...

Back to Top ↑

sql-injection

Flushed Emoji challenge Writeup

4 minute read

Lexington Informatics Tournament CTF CTF 2022 was held from the 22nd of July Until the 25th of the month , and we have participated under the team 0xcha0s, w...

Back to Top ↑

Jekyll

Alferd

2 minute read

In this room, we’ll learn how to exploit a common misconfiguration on a widely used automation server(Jenkins - This tool is used to create continuous integr...

Back to Top ↑

RCE

Back to Top ↑

path poisoning

Back to Top ↑

chisel

Horizontall Hackthebox writeup

3 minute read

we got low-privilege access due to Vulnerable version of strapi CMS then got root access because of the Vulnerable Version of Laravel. main techniques used a...

Back to Top ↑

SSTI

Bolt Hackthebox writeup

6 minute read

In this Hackthebox we will go analyze a docker img files and from there will find some juicy stuff will help us login to a vhost “demo” which has some functi...

Back to Top ↑

PGP Decrypting

Bolt Hackthebox writeup

6 minute read

In this Hackthebox we will go analyze a docker img files and from there will find some juicy stuff will help us login to a vhost “demo” which has some functi...

Back to Top ↑

scf attacks

Driver Hackthebox writeup

4 minute read

In this Box, we are going to abuse the ability of uploading the firmware of a shared printer and capture the NTLMv2 hash of a user on this machine. By cracki...

Back to Top ↑

evil-winrm

Driver Hackthebox writeup

4 minute read

In this Box, we are going to abuse the ability of uploading the firmware of a shared printer and capture the NTLMv2 hash of a user on this machine. By cracki...

Back to Top ↑

rce

Devzat Hackthebox writeup

5 minute read

In this Hackthebox we will get a user access through a command injection in a vhost , then will make port forwarding to find a service that will give us the ...

Back to Top ↑

API

Secret Hackthebox writeup

4 minute read

In this Box we are going to follow documentation instructions to create a new user , will face sensitive data exposure will let us see a delete commit ,this ...

Back to Top ↑

SUID

Secret Hackthebox writeup

4 minute read

In this Box we are going to follow documentation instructions to create a new user , will face sensitive data exposure will let us see a delete commit ,this ...

Back to Top ↑

core-dump

Secret Hackthebox writeup

4 minute read

In this Box we are going to follow documentation instructions to create a new user , will face sensitive data exposure will let us see a delete commit ,this ...

Back to Top ↑

ipmi

Shibboleth Hackthebox writeup

3 minute read

In this Box we are going to enumerate a udp port and dump the administrator hash ,then we will crack it , using these credentials we will login to the zabbix...

Back to Top ↑

maria-DB

Shibboleth Hackthebox writeup

3 minute read

In this Box we are going to enumerate a udp port and dump the administrator hash ,then we will crack it , using these credentials we will login to the zabbix...

Back to Top ↑

zabbix

Shibboleth Hackthebox writeup

3 minute read

In this Box we are going to enumerate a udp port and dump the administrator hash ,then we will crack it , using these credentials we will login to the zabbix...

Back to Top ↑

SQL injection

SQL Tutor challenge writeup

3 minute read

DCTF 2022 was held from the 15th of April Until the 17th of the month , and we have participated under the team 0xcha0s, we have managed to solve multiple ch...

Back to Top ↑

python

SQL Tutor challenge writeup

3 minute read

DCTF 2022 was held from the 15th of April Until the 17th of the month , and we have participated under the team 0xcha0s, we have managed to solve multiple ch...

Back to Top ↑

wordpress

Backdoor Hackthebox writeup

3 minute read

In this easy Linux box we are facing a wordpress plugin vulnerable to directory traversal letting us reading some files on the system , brute forcing the /pr...

Back to Top ↑

Waste

Backdoor Hackthebox writeup

3 minute read

In this easy Linux box we are facing a wordpress plugin vulnerable to directory traversal letting us reading some files on the system , brute forcing the /pr...

Back to Top ↑

directory Traversal

Backdoor Hackthebox writeup

3 minute read

In this easy Linux box we are facing a wordpress plugin vulnerable to directory traversal letting us reading some files on the system , brute forcing the /pr...

Back to Top ↑

gdb server

Backdoor Hackthebox writeup

3 minute read

In this easy Linux box we are facing a wordpress plugin vulnerable to directory traversal letting us reading some files on the system , brute forcing the /pr...

Back to Top ↑

screen

Backdoor Hackthebox writeup

3 minute read

In this easy Linux box we are facing a wordpress plugin vulnerable to directory traversal letting us reading some files on the system , brute forcing the /pr...

Back to Top ↑

TryHackme

Windows-PrivEsc-Arena TryHackMe writeup

8 minute read

During studying the TCM windows privilege escalation course this is the Lab designed to cover the topics mentioned in the course. it has been a while since i...

Back to Top ↑

windows-privesc

Windows-PrivEsc-Arena TryHackMe writeup

8 minute read

During studying the TCM windows privilege escalation course this is the Lab designed to cover the topics mentioned in the course. it has been a while since i...

Back to Top ↑

html injection

Hacker Ts challenge writeup

1 minute read

Nahamcon ctf 2022 was held from the 28th of April Until the 30th of the month , and we have participated under the team 0xcha0s. this challenge idea was pret...

Back to Top ↑

directory-traversal

Unicode Hackthebox writeup

5 minute read

In This medium Box we are playing with JWT Tokens in specific the jku Claim Misuse , which will let us login as admin account then we will use the Unicode En...

Back to Top ↑

decompile-binary

Unicode Hackthebox writeup

5 minute read

In This medium Box we are playing with JWT Tokens in specific the jku Claim Misuse , which will let us login as admin account then we will use the Unicode En...

Back to Top ↑

IDOR

Kryptos Support challenge Writeup

2 minute read

HTB Cyber Apocalypse CTF 2022 was held from the 14th of May Until the 19th of the month , and we have participated under the team 0xcha0s, we have managed to...

Back to Top ↑

snmp

Pandora Hackthebox writeup

3 minute read

In This Box we are going to enumerate the snmp port which will show user daniel with his password as a string in the output , we are going to login with ssh ...

Back to Top ↑

Path-Poisoning

Pandora Hackthebox writeup

3 minute read

In This Box we are going to enumerate the snmp port which will show user daniel with his password as a string in the output , we are going to login with ssh ...

Back to Top ↑

Vulnhub

napping 1.0.1 vulnhub writeup

5 minute read

In This VulnHub Box, we are facing a relatively an interesting vulnerability which is tab-nabbing that will help us phish the admin to get his credentials wh...

Back to Top ↑

tab-nabbing

napping 1.0.1 vulnhub writeup

5 minute read

In This VulnHub Box, we are facing a relatively an interesting vulnerability which is tab-nabbing that will help us phish the admin to get his credentials wh...

Back to Top ↑

phishing

napping 1.0.1 vulnhub writeup

5 minute read

In This VulnHub Box, we are facing a relatively an interesting vulnerability which is tab-nabbing that will help us phish the admin to get his credentials wh...

Back to Top ↑

vim

napping 1.0.1 vulnhub writeup

5 minute read

In This VulnHub Box, we are facing a relatively an interesting vulnerability which is tab-nabbing that will help us phish the admin to get his credentials wh...

Back to Top ↑

apk

Routerspace Hackthebox writeup

2 minute read

In this Box we are going to examine an android appliacation (apk) , and monitroing the requests by placing a proxy we will notice a request which we can mani...

Back to Top ↑

adb

Routerspace Hackthebox writeup

2 minute read

In this Box we are going to examine an android appliacation (apk) , and monitroing the requests by placing a proxy we will notice a request which we can mani...

Back to Top ↑

sudo-exploit

Routerspace Hackthebox writeup

2 minute read

In this Box we are going to examine an android appliacation (apk) , and monitroing the requests by placing a proxy we will notice a request which we can mani...

Back to Top ↑

ssti

Flushed Emoji challenge Writeup

4 minute read

Lexington Informatics Tournament CTF CTF 2022 was held from the 22nd of July Until the 25th of the month , and we have participated under the team 0xcha0s, w...

Back to Top ↑

Active-directory

Timelapse Hackthebox writeup

4 minute read

In this Box we are against a windows machine has the active directory service installed on it , we can list files on smb shares and access some shared folder...

Back to Top ↑

LAPS

Timelapse Hackthebox writeup

4 minute read

In this Box we are against a windows machine has the active directory service installed on it , we can list files on smb shares and access some shared folder...

Back to Top ↑

pfx

Timelapse Hackthebox writeup

4 minute read

In this Box we are against a windows machine has the active directory service installed on it , we can list files on smb shares and access some shared folder...

Back to Top ↑

git

Open Source HackTheBox Writeup

4 minute read

In This Box we are facing interesting Stuff like Docker , git hooks and other stuff. first we got access to a docker in the machine by overwritting the appli...

Back to Top ↑

docker

Open Source HackTheBox Writeup

4 minute read

In This Box we are facing interesting Stuff like Docker , git hooks and other stuff. first we got access to a docker in the machine by overwritting the appli...

Back to Top ↑

CSP

JustCTF Extra Safe Security Layers writeup

6 minute read

This Challenge is about exploiting cross site scripting with a strict CSP in place along with XSS Santizer and other restrictions , the interesting part in t...

Back to Top ↑