TryHackMe Enterprise Walkthrough 🏢

You just landed in an internal network. You scan the network and there's only the Domain Controller...
Read more →

Shellshock (CVE-2014–6271)⚡ Here’s what you need to know:

Shellshock, also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. One of the biggest risks involving Shellshock is how easy it is for hackers to exploit. Using only a few lines of code, hackers can potentially give commands to the hardware they’ve targeted without having any authorization or administrative access. Estimates put the total number affected at around 500 million servers in total.
Read more →

Install a software package from the Extras Library on an EC2 instance ☁️

To install a software package from the Extras Library, first confirm that the amazon-linux-extras repository is installed on your instance. Then, list the available software packages, enable the one you’re looking for, and then install the package using yum.
Read more →

Upload Files Using CURL 📨

CURL is a command line tool to transfer data to or from a server, using any of the supported protocols (HTTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP or FILE).
Read more →

CVE-2016–2098 💎

Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application’s unrestricted use of the render method.
Read more →

Troll 1: Walkthrough 🤡

Tr0ll was inspired by the constant trolling of the machines within the OSCP labs. The goal is simple, gain root and get Proof.txt from the /root directory. Not for the easily frustrated! Fair warning, there be trolls ahead!
Read more →

SickOS: 1.2 Walkthrough 🤒

This is second in following series from SickOs and is independent of the prior releases, scope of challenge is to gain highest privileges on the system.
Read more →

Kioptrix: Level 1 (#1) Walkthrough 🛡️

This Kioptrix VM Image are easy challenges. The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player). The purpose of these games are to learn the basic tools and techniques in vulnerability assessment and exploitation. There are more ways then one to successfully complete the challenges.
Read more →