THM: tomghost walkthru
You can find the training room here. As usual, we ran NMAP and wFuzz to gather as much information as we can about the target. With NMAP we get our […]
You can find the training room here. As usual, we ran NMAP and wFuzz to gather as much information as we can about the target. With NMAP we get our […]
You can find the training room here. At the beginning as usal we try to get as much information as we can from the target. For this we are using […]
You can find the training room here. We run our basic scans to find open ports and directories on the target. We found a open SSH port (22) and a […]
You can find the room here. First of all we run nmap and scan for open ports and services. I also tried a directory scan with gobuster but it cant […]
It says follow the white rabbit, so lets go. Looking around the website while checking the sourcecode we found the directory for the pictures. Lets move to this and check […]
After the mashine is deployed we check the source-code of the website but here is nothing interesting to find. So let’s move forward with our basic procedere run nmap and […]
While infilatrating a system it is mostly necessary no escalate your privileges to another user or the root user. While learning about priv-esc on linux-system I often used a simple […]
First of all, we run our basic scans to check for open ports and directories on our target. While this scans run we have a look at the web-page, but […]
While seting up a new VM on my workstation I ran in a couple of errors while trying to run hashcat. Mostly the error appears with Ryzen cpu’s, since I […]
This room has took me some time and I noticed that my solution is a little bit different to the other writeups about this room, so feel free to check […]