Hackthebox Resolute writeup
It is a medium level box which has smb ports open .And on little enumeration we get creds for a user.Which in real are correct for other user.Then we get Another creds in a hidden script .Followed by the Using Dnsadmin Privileges to set our malicious .dll payload to get the root.
HackThebox Cache writeup
It involves directory enumeration followed by finding new site.Then exploiting openerm followed by getting creds with Memcached.Then a simple privilege escalation by docker
HackTheBox Admirer writeup
This machine is currently active on hackthebox wait until it gets retired or if you have owned it then you need to get the Administrator NTLM hash or the root password hash from the file /etc/shadow file
Hackthebox Obscurity writeup
It involves directory fuzzing and then exploiting a python function followed by some crypto.And root was interesting did it in two ways .
Nmap Cheatsheet 2020
Nmap 7.70 Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc.Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254-iL : Input from list of hosts/networks-iR : Choose random targets–exclude : Exclude hosts/networks–excludefile : Exclude list from file HOST DISCOVERY: -sL: List Scan – simply list targets to scan-sn: Ping Scan – disable … Read more