Cloudy Core
CloudyCore Writeup Table of Contents Introduction First Steps Step 1: Visual Inspection with Netron Step 2: Extracting the Tensors Step 3: Analyzing the Output Step 4: The Logic (XOR...
CloudyCore Writeup Table of Contents Introduction First Steps Step 1: Visual Inspection with Netron Step 2: Extracting the Tensors Step 3: Analyzing the Output Step 4: The Logic (XOR...
Starshard Reassembly Writeup Table of Contents Introduction First Steps Solution 1. Introduction Starshard Reassembly is an easy challenge from HTB University CT...
Dog Writeup Table of Contents Service Enumeration Web Recon Privilege Escalation 1. Service Enumeration We begin with an nmap scan. Port 80 is open, so the hostname is added to /etc/hos...
UnderPass Writeup Table of Contents Service Enumeration Web Recon Grafana Privilege Escalation 1. Service Enumeration We start with the usual nmap scan. Port 80 is open, so we add the...
UnderPass Writeup Table of Contents Service Enumeration Web Recon Radius UI Privilege Escalation 1. Service Enumeration First, we start with the usual nmap. As usual, we have port 80 ...
This is a .exe file that when we run it prompts for a terminal and asks for a username and password. First of all, we run strings on the binary. Here, we can see the version of the file and...
Sightless Writeup Table of Contents Initial Foothold Exploration NMap Scan Sightless.htb Homepage Identifying Vulnerabilities SQLPad Vulnerability ...
Shocker Writeup Table of Contents Service Enumeration Web Recon CVE-2014-6271 Privilege Escalation 1. Recon As usual, we start with an Nmap scan to identify open ports and services. ...
Sea writeup Table of Contents Service Enumeration Web Recon Exploiting CVE-2023-41425 Privilege Escalation 1. Recon We can see port 22 and 80 open, let’s start by checking the...
Sea Writeup Table of Contents Service Enumeration Web Recon Lateral Movement Privilege Escalation 1. Service Enumeration As usual, we start with an Nmap scan to identify open ports and...