hackthebox
-
Read more: Protected: Instant – Hack The Box – @lautarovculic
There is no excerpt because this is a protected post.
-
Read more: Protected: Sea – Hack The Box – @lautarovculic
There is no excerpt because this is a protected post.
-
Read more: FastJson and Furious – Hack The Box – @lautarovculic
Difficult: Easy Category: Mobile OS: Android Description: A couple years ago I was experimenting with Android Development and I created this application to hide my secret, but now I forgot how to get it back. Can you help me? First, download the .zip file and extract them with hackthebox password. Then, we’ll use apktool for…
-
Read more: Protected: GreenHorn – Hack The Box – @lautarovculic
There is no excerpt because this is a protected post.
-
Read more: PermX – Hack The Box – @lautarovculic
User.txt Let’s see what ports are open with nmap sudo nmap -sV -p- -Pn -vv -T4 10.10.11.23 Output: PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack ttl 63 Apache httpd 2.4.52 Service Info: Host: 127.0.1.1; OS: Linux; CPE: cpe:/o:linux:linux_kernel Let’s…
-
Read more: Blazorized – Hack The Box – @lautarovculic
User.txt In first place, we need know what ports are open with nmap sudo nmap -sV -p- -Pn -vv -T4 10.129.81.51 Output: PORT STATE SERVICE REASON VERSION 53/tcp open domain syn-ack ttl 127 Simple DNS Plus 80/tcp open http syn-ack ttl 127 Microsoft IIS httpd 10.0 88/tcp open kerberos-sec syn-ack ttl 127 Microsoft Windows Kerberos…
-
Read more: Axlle – Hack The Box – @lautarovculic
User.txt First we need search for open ports in the machine sudo nmap -sV -p- -Pn -vv -T4 10.129.78.149 Output: PORT STATE SERVICE REASON VERSION 25/tcp open smtp syn-ack ttl 127 hMailServer smtpd 53/tcp open domain syn-ack ttl 127 Simple DNS Plus 80/tcp open http syn-ack ttl 127 Microsoft IIS httpd 10.0 88/tcp open kerberos-sec…
-
Read more: Editorial – Hack The Box – @lautarovculic
User.txt Let’s discover what open ports are here with nmap sudo nmap -sV -p- -Pn -vv -T4 10.129.75.79 Output: PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.9p1 Ubuntu 3ubuntu0.7 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack ttl 63 nginx 1.18.0 (Ubuntu) Add the editorial.htb and tiempoarriba.htb to our /etc/hosts…
-
Read more: Blurry – Hack The Box – @lautarovculic
User.txt First, let’s discover the open ports with nmap sudo nmap -sV -p- -Pn -vv -T4 10.129.71.205 Output: PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0) 80/tcp open http syn-ack ttl 63 nginx 1.18.0 Let’s add blurry host to our /etc/hosts file sudo echo “10.129.71.205 blurry.htb”…
-
Read more: Joker – Hack The Box – @lautarovculic
Difficult: Hard Category: Mobile OS: Android Description: The malware reverse engineering team got an alert about malware which is still published on Google’s PlayStore and has thousands of installs. Can you help them to identify the address of the command and control server in order to blacklist it ? Download and extract the .zip file…