Breach
I began the assessment with a comprehensive Nmap scan to identify open ports and running services on the target domain controller:
2509 words
|
13 minutes
Cover Image of the Post
Pipeline | CyberOdyssey CTF
This challenge presented us with a multi-service architecture consisting of three interconnected servers.
317 words
|
2 minutes
Cover Image of the Post
Data
HackTheBox machine featuring Grafana path traversal vulnerability and Docker privilege escalation
1153 words
|
6 minutes
Cover Image of the Post
Sendai
VulnLab Windows Active Directory machine featuring weak password policies and certificate template hijacking
4941 words
|
25 minutes
Cover Image of the Post
VulnCicada
VulnLab Windows Active Directory machine demonstrating NFS misconfigurations and credential exposure
2379 words
|
12 minutes
Cover Image of the Post
TheFrizz
Hack The Box Windows machine, medium difficulty
886 words
|
4 minutes
Cover Image of the Post
Checker
Hack The Box linux machine, hard difficulty
1207 words
|
6 minutes
Cover Image of the Post
Cypher
Hack The Box linux machine, medium difficulty
1306 words
|
7 minutes
Cover Image of the Post
1
2