• Building a Slack Bot with Python

    The slack bot that I will be building has a feature that will automatically fetch the latest tweets from my subscribed lists (Information Security related) on Twitter. Thanks to this guide I was ab…
  • Hack the Box Legacy Get System no Jutsu

    This post contains the actual commands that I used in hacking and getting the user and root hashes on HTB Legacy Box. Enumeration kaipowered@debian:~/Downloads/enum4linux-0.8.9/enum4linux-0.8.9$ su…
  • Vulnhub SkyDog 2016 – Catch Me If You Can

    The SkyDogConCTF is one of the most enjoyable CTF challenges that I have ever played because it contained a lot of twists and challenges that don’t need advanced exploitation techniques …
  • Vulnhub Tr0ll 1

    Started with the Nmap Scan # Nmap 7.40 scan initiated Thu Aug 3 20:58:47 2017 as: nmap -sC -sV -oA nmap 192.168.8.102 Nmap scan report for 192.168.8.102 Host is up (0.0035s latency). Not shown: 997…
  • Phases of Penetration Testing

    Penetration Testing or Pentesting is a process where the testers will assess and discover the vulnerabilities that are present in a network or system and will exploit these vulnerabilities to gain …

subscribe via RSS