- Vulnyx: Monitor Writeup | Hard
- CyberWave: BatBlog Writeup | Easy
- CyberWave: DevOops Writeup | Easy
- Hack The Box: Axlle Writeup | Hard
- CyberWave: Analytics Writeup | Medium
- HackMyVM: DC03 Writeup | Medium
- HackMyVM: Juggling Writeup | Hard
- Hack The Box: Freelancer Writeup | Hard
- HackMyVM: DC02 Writeup | Medium
- Hack The Box: EvilCUPS Writeup | Medium
- Vulnhub: LupinOne Writeup | Medium
- Hack The Box: SolarLab Writeup | Medium
- Hack The Box: Pollution Writeup | Hard
- Hack The Box: AppSanity Writeup | Hard
- Mi primer CVE - CVE-2024-44541
- Hack The Box: Resolute Writeup | Medium
#403 Bypass
#Abusing .Xauthority Cookie
#Abusing Account Operators
#Abusing AddKeyCredentialLink
#Abusing AddSelf
#Abusing Ajenti Terminal
#Abusing AllExtendedRights
#Abusing Ansible
#Abusing Ansible-Playbook
#Abusing API
#Abusing Apt-Get
#Abusing Arp SUID
#Abusing AV Exclusions
#Abusing Backup Operators
#Abusing Bash Globbing
#Abusing Bash Script
#Abusing Bat Task
#Abusing Broken Access Control
#Abusing Bundler
#Abusing Business Logic Error
#Abusing CA
#Abusing Cached Credentials
#Abusing Cap_setuid
#Abusing Convert.iconv Filter
#Abusing Credentials Reuse
#Abusing Cron
#Abusing Custom Binary
#Abusing CVE-2024-42327
#Abusing CVE-2024-47176
#Abusing DAC_OVERRIDE
#Abusing DnsAdmin Group
#Abusing Docker
#Abusing Dynamicpreprocessor
#Abusing ExecuteDCOM
#Abusing FastCGI PHP-FPM
#Abusing FILE Privilege
#Abusing File_get_contents
#Abusing ForceChangePassword
#Abusing GenericAll
#Abusing GenericWrite
#Abusing Http_proxy
#Abusing Insecure Credentials
#Abusing Jamovi
#Abusing Java Application
#Abusing JWT
#Abusing JWT Reuse
#Abusing Kerberos
#Abusing LD_PRELOAD
#Abusing Lfm Binary
#Abusing LibreNMS
#Abusing LibreOffice Socket
#Abusing Logic Error
#Abusing LOLBins
#Abusing Missconfigured Python Library
#Abusing MongoDB
#Abusing Netdev Group
#Abusing NFS UID/GID Missmatch
#Abusing Pager
#Abusing Passpie
#Abusing Password Reuse
#Abusing Pdfkit V0.8.6
#Abusing PHP Filter Wrapper
#Abusing PHP Session Temp Files
#Abusing PHP Wrappers
#Abusing Poor Entropy
#Abusing PreBuild
#Abusing Procmon
#Abusing PSWA
#Abusing RDP Session
#Abusing ReadGMSAPassword
#Abusing Restic Service
#Abusing Rj Editor
#Abusing Role Overflow
#Abusing SCF
#Abusing SeBackupPrivilege
#Abusing SeImpersonatePrivilege
#Abusing SeLoadDriverPrivilege
#Abusing SETENV
#Abusing Shared Library
#Abusing Simple-Git
#Abusing StandaloneRunner
#Abusing Storing Passwords in Plaintext
#Abusing Str.format()
#Abusing Sudo
#Abusing Sudo Custom Script
#Abusing Sudo Privilege
#Abusing Sudo Privilege in Nmap
#Abusing Sudo Privileges
#Abusing Sudoers
#Abusing Sudoers Privilege [Privilege Escalation]
#Abusing SUID Pinns Privilege
#Abusing Symbolic Link
#Abusing SYS_PTRACE
#Abusing ThinkPHP
#Abusing Tomcat
#Abusing Topal
#Abusing User Script Path
#Abusing User_allow_other
#Abusing Vault SSH OTP
#Abusing Web Sockets
#Abusing Web.config
#Abusing Windows Management Instrumentation
#Abusing Windows PowerShell Web Access
#Abusing WinRM
#Abusing WMI
#Abusing WriteOwner
#Abusing WSL
#Abusing WSUS
#Abusing Xp_cmdshell
#Abusing Zabbix API Tokens
#Abusing Zabbix RPC API
#Access
#Active Directory
#Acute
#Analysis
#Analytics
#Analyzing .NET Code
#Analyzing .NET Source Code
#Analyzing EML File
#Analyzing EVTX File
#Analyzing Memory Dump
#Analyzing Python Source Code
#Analyzing Source Code
#Ansible
#Antique
#API Enumeration
#API Exploitation (Command Injection)
#AppSanity
#Arbitrary File Upload
#ASREPRoast
#ASREPRoasting
#Authentication Bypass
#Authentication Cookie Bruteforce,
#Autologon Credentials
#Axlle
#Bagel
#Bash Scripting
#BatBlog
#Binary Decompiling
#Binary Formatter
#Blind SQL Injection
#Blind XXE
#BloodHound
#Bloodhound Enumeration
#Bounty
#Brute-Forcing PID's Cmdline
#Bruteforce
#Bruteforcing
#Buffer Overflow
#Builder
#Burpsuite
#Bypass Unix Permissions
#Bypassing
#Bypassing Anti-Executable GPO
#Bypassing AppLocker
#Bypassing AV via Ofuscating
#Bypassing File Type Check
#Bypassing Microsoft Excel Protection
#Bypassing Upload Filter
#Bypassing WAF
#C2
#Cap
#CDK
#Certificate Cracking
#Certificates
#Chisel
#Chisel Tunnel + Postgresql Service Enumeration + Information Leakage
#CIFS Mounting
#Clicker
#Code Analysis
#Code Injection
#Codebase Exfiltration
#Command Injection
#Compiled
#Configuring Kerberos Realm
#Constrained Delegation
#Container Discovering
#Container Pivoting
#Controler
#Cookie Hijacking
#Cracking
#Cracking NTLMv2
#Cracking PDF Hash
#Cracking TGT
#Creating Admin Account in LibreNMS
#Creating Custom Certificate
#Creating Malicious Browser Link
#Creating Malicious DLL
#Creating Malicious HTA
#Creating Malicious XLL
#Credentials Reuse
#CRLF Injection
#Cross Session Relay
#Cross Site Scripting
#CSRF
#CTF
#CUPS Enumeration
#CVE
#CVE-2002-1048
#CVE-2012-5519
#CVE-2019-25137
#CVE-2020-35734
#CVE-2021-29447
#CVE-2022-0543
#CVE-2022-0811 (CRI-O & Pinns)
#CVE-2022-21699
#CVE-2022-23935
#CVE-2022-24637
#CVE-2022-25765
#CVE-2022-30190
#CVE-2023-28432
#CVE-2024-20656
#CVE-2024-32002
#CVE-2024-44541
#CVE-2024-47176
#Cybersecurity
#CyberWave
#Data Exfiltration
#DC02
#DC03
#DCSync
#Decompiling .NET
#Decompiling .NET Dll W/DotPeek
#Decompiling Bytecode
#Decompyle3
#Decrypting
#Decrypting Admin Credentials
#Decrypting Firefox Stored Credentials
#Decrypting Jenkins Credentials
#Decrypting Password
#Deserialization
#DevOops
#Dictionary Attack
#Directory Path Traversal
#Discovering Exploitable File Extensions
#Discovering Internal Hosts
#Discovering Internal Services
#Discovering Subdomains
#DLL Hijacking
#DNS Bruteforce
#DNS Enumeration
#Docker
#Docker Breakout
#Docker Enumeration
#Docker Registry Enumeration
#Domain User Enumeration
#DotPeek
#Dumping Firefox Logins.json and Key4.db
#Dumping Jenkins Credentials
#Dumping LSASS Credentials
#Dumping SAM
#Dumping SAM and SYSTEM Hive
#Dumping Secrets
#ElasticDB Enumeration
#Enumerating HTTP
#Enumerating LDAP
#Enumerating NFS
#Enumerating PrestaShop
#Enumerating SMB
#Enumerating Snort Service
#Enumerating Webmin
#Erlang Cookie RCE,
#Erlang Port Mapper Daemon Enumeration
#Escaping Docker
#Escaping Docker Container
#Evil WAR
#EvilCUPS
#EvilWinRM
#Exfiltrating Root Private Key
#Exploit
#Exploit Development
#Exploiting CAP_DAC_READ_SEARCH Manually (Shocker.c)
#Exploiting CAP_DAC_READ_SEARCH With CDK
#Exploiting HTTP Parser Inconsistencies
#Exposed Credentials
#Exposed SSH Logs
#Exposed User Credentials
#Extracting Python Bytecode
#Faculty
#Follina
#Format
#FormulaX
#FreeBSD
#Freelancer
#FTP Enumeration
#FTP Enumeration (Using Binary Mode)
#FullPowers.exe
#FUSE
#Fuzzing
#GHidra
#Git_dumper.py
#GitBucket Enumeration
#Gitea
#Gitea Bruteforce
#Gitea Enumeration
#Go Scripting
#GodPotato.exe
#Gofer
#Gopher
#GSSAPI
#HackMyVM
#HackTheBox
#Hash Cracking
#HTML Injection
#HTTP Enumeration
#HTTP Enumeration,
#HTTP Method Confusion
#HTTP-GET Bruteforcing
#HTTPS Enumeration
#Hydra
#IDOR
#IMF:1
#Impersonating
#Impersonating Sa MSSQL
#Index
#Information Disclosure
#Information Leakage
#Informative
#InsanityHosting
#Insecure Deserialization
#Insecure Direct Object Reference
#Insecure JSON Deserialization
#Insecure Object Direct Reference
#Internal Hosts Enumeration
#Internal Services Enumeration
#Intuitions
#Investigation
#IPv6 TCP Enumeration
#Jab
#Jenkins Enumeration
#Jerry
#Juggling
#JuicyPotato
#JWT Analysis
#Kerberoast
#Kerberoasting
#Kerbrute
#Lang
#Lantern
#Lateral Movement
#LDAP Enumeration
#LDAP Injection
#LFI
#Library Hijacking
#Linux
#LLMNR Spoofing
#Local File Inclusion
#Log Poisoning
#Luke
#LupinOne
#Magic Numbers
#Malicious Blazor Component
#Malicious ODT
#Manager
#Mass Assignment Vulnerability
#MDB Files (Mdbtools)
#Mentor
#MetaTwo
#MinIO Enumeration
#Misconfigured Webmin Configuration File
#Modifying Core Pattern
#Modifying PHP Serialized Session
#MongoDB Enumeration
#Monitor
#NAPLISTENER
#Napper
#NBT-NS Enumeration
#Network Security
#NFS Enumeration
#Nginx Misconfiguration
#NTDS.dit Dumping
#NTLM Cracking
#NTLM Stealing
#NTLMv2 Hash Cracking
#Object
#Obtaining Domain SID From ObjectSid
#Onesixtyone
#Openfire
#Openfire Jabber Enumeration
#OpenPLC
#Outdated
#Overwriting Binfmt_misc
#Pass the Hash
#Pass the Hass
#Password Cracking
#Password Reuse
#Password Spraying
#Path Hijacking
#Path Traversal
#Pbkdf2 Hash Cracking
#Penetration Testing
#Perl Scripting
#Pfx2john
#PGLabs
#Phising
#Photobomb
#PHP Code Analysis
#PHP Code Injection
#PHP Type Juggling
#Pollution
#Port Forwarding
#PowerView.ps1
#Precious
#Predictable File Name
#Private Key
#Privilege Escalation
#Prototype Pollution
#PST Files (Pst-Utils)
#Pyinstxtractor.py
#Python
#Python Scripting
#Python Scripting,
#RCE
#Read Internal File
#Read/Write File Exploit
#Rebound
#Recovering Privileges
#RedPanda
#Reflected SQL Injection
#Reflected XSS
#Registry
#Remote
#Remote Command Execution
#Rerverse Port Forwarding
#Resolute
#Resource
#Resource-Based Constrained Delegation
#Restic Server
#Ret2reg
#Reverse ELF Binary
#Reverse Ingeniering
#Reverse Port Forwarding
#Reverse Proxy
#Reverse Shell
#Reversing
#Reversing .NET Executable
#Reversing ELF Binary
#Reversing Engineering
#Reversing Executable
#Reversing PyInstaller Compiled Executable
#Reversing Windows Executable
#RID Cycling
#RPC Enumeration
#RunasCs.exe
#S3 Enumeration
#SAM Dumping
#Scrambled
#Scripting
#Scripting,
#Sea
#Seal
#Search
#SecNotes
#Server Side Request Forgery
#Shadow Credentials
#Shared
#SharpHound
#Silver Ticket Attack
#Sizzle
#Skyfall
#Sliver
#SMB
#SMB Bruteforce
#SMB Enumeration
#SMB Enumeration Without NTLM Authentication
#SMB Relay
#Sniffing HTTP
#Sniper
#SNMP Enumeration
#SNMP Enumeration (Snmpwalk && Snmpbulkwalk) + Community String Brute Force
#SNMP Enumeration,
#SolarLab
#Source Code Analysis
#Spring Boot
#SQL Injection
#SQLi
#Squashed
#SSH Bruteforce
#Ssh2john
#SSL Certificate Enumeration
#SSL Certificate Examination
#SSL Certificate Inspection
#SSTI
#Static Binary Analysis
#Stored XSS
#Subdomain Enumeration
#Subdomain Enumerations
#Subdomain Fuzzing
#Sudo Dotnet Permission
#Talkative
#TeamViewer 7 Passwords
#TGS Cracking
#Toolbox
#Unrested
#Updating Webmin Password
#UrlLib Exploitation
#User Enumeration
#User Pivoting
#Username Bruteforce
#Username Enumeration
#Vault Enumeration
#Vessel
#VHost Fuzzing
#Virtual Hosting
#Virtual Hosting Fuzzing
#Visual
#Volatility
#VSStandardCollectorService150 Service
#Vulnhub
#Vulnyx
#Weaponizing .NET Project
#Weaponizing BoltCMS
#Weaponizing CHM File
#Weaponizing Jenkins
#Weaponizing RocketChat
#Weaponizing Visual Studio Project
#Web Fuzzing
#Web Hacking
#Web Shell
#WifineticTwo
#Windows
#Winpeas Enumeration
#WinRM
#Wireless Hacking
#Wireshark
#Wmiexec.py
#WPS
#Writeup
#Writing MsDS-KeyCredentialLink
#XMPP Enumeration
#XSS
#XXE
#YAML Deserialization
#Ysoserial.net
#Zabbix Privilege Escalation
#Zabbix Remote Code Execution
#Zipping