capture the flag, cybersecurity education, hacking, owasp, web application security

#PwnItFridays @hackthebox_eu Staring Point Series: Explosion

Another day, another challenge.

I’m restarting the series #PwnItFriday where I hack machines from hackthebox and TryHackMe.

Without further ado, the machine I’m solving today is Explosion.

Topics explored in this machine are networking, programming, remote desktop protocol (RDP), reconnaissance, and weak credentials.

Click the video to learn how to solve this machine!

Like the content — support by Buying a Coffee

capture the flag, cybersecurity education, hacking, owasp, web application security

#PwnItFridays @hackthebox_eu Staring Point Series: Synced

Another day, another challenge.

I’m restarting the series #PwnItFriday where I hack machines from hackthebox and TryHackMe.

Without further ado, the machine I’m solving today is Synced.

Topics explored in this machine are connecting to a Rsync server, networking protocols, reconnaissance, and anonymous/guest access.

Click the video to learn how to solve this machine!

Like the content — support by Buying a Coffee

capture the flag, cybersecurity education, hacking, owasp, web application security

#PwnItFridays @hackthebox_eu Staring Point Series: Mongod

Another day, another challenge.

I’m restarting the series #PwnItFriday where I hack machines from hackthebox and TryHackMe.

Without further ado, the machine I’m solving today is Mongod.

Topics explored in this machine are connecting to a web servers, databases, reconnaissance, misconfigurations, and anonymous/guest access.

Click the video to learn how to solve this machine!

Like the content — support by Buying a Coffee

capture the flag, cybersecurity education, hacking, owasp, web application security

#PwnItFridays @hackthebox_eu Staring Point Series: Redeemer Machine

Another day, another challenge.

I’m restarting the series #PwnItFriday where I hack machines from hackthebox and TryHackMe.

Without further ado, the machine I’m solving today is Redeemer.

Topics explored in this machine are connecting to a Redis server, vulnerability assessments, database, reconnaissance, and anonymous/guest access.

Click the video to learn how to solve this machine!

Like the content — support by Buying a Coffee