Boom Bashed 🧨💥

Bashed is a retired HackTheBox machine, rated easy and rightfully. We’ll start by finding a hidden web shell to quickly gaining root level access due to misconfigured permissions to users. Reconnaissance nmap scan Starting the reconnaissance with an initial Nmap scan. nmap -sC -sV -oA nmap/bashed 10.129.183.146 -sC: run default nmap scripts -sV: detect service version -oA: output all formats and store in file nmap/bashed Nmap scan report for 10.129.183.146 Host is up (0.
Read more →

Bash and the Shellshock ⚡️

Introduction to ShellShock ShellShock Vulnerability [CVE-2014-6271], also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. Shellshock could enable an attacker to cause Bash to execute arbitrary commands and gain unauthorized access to many Internet-facing services, such as web servers, that use Bash to process requests. Shellshock is a privilege escalation vulnerability that offers a way for users of a system to execute commands that should be unavailable to them.
Read more →

FreeFloat FTP Buffer Overflow 🪣💦

In this writeup i’ll demonstrate how to exploit Buffer Overflow in FreeFloat FTP Server on windows. The vulnerable application is can be downloaded from Here. The Freefloat FTP Server has many vulnerable parameters which can be useful to practice and we will choose one of them here to do a full exercise.  Lab details Victim Machine: Windows XP SP1 x64 2003 Application: FreeFloat Ftp Server (Version 1.00) Attacker Machine: Kali Linux 2021.
Read more →

Exploiting PHP deserialization 🔐

Intro to Insecure deserialization Serialization is when an object in a programming language (say, a Java or PHP object) is converted into a format that can be stored or transferred. Whereas deserialization refers to the opposite: it’s when the serialized object is read from a file or the network and converted back into an object. Insecure deserialization vulnerabilities happen when applications deserialize objects without proper sanitization. An attacker can then manipulate serialized objects to change the program’s flow.
Read more →

From MSSQL to RCE 🚀

Microsoft SQL Server is a relational database management system developed by Microsoft. As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet). In this blog we’ll try to get remote code execution by exploiting MSSQL. Enumeration Nmap Scan nmap -sC -sV -oA nmap/archetype 10.
Read more →

Steganography for beginners 🔏

Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. … The word steganography is derived from the Greek words steganos (meaning hidden or covered) and the Greek root graph (meaning to write) - Wikipedia. In this post, we are going to describe solutions to the KRACK-JIIT CTF 2019 Organized by JIIT Open Dev Circle (jodc).
Read more →

Mass Printer Hacking Case Study 🖨

Introduction to battle for getting YouTube crown. A battle for who owns the YouTube crown for top channel has been waged over the past few months between fans of Swedish video game commentary celebrity Felix Kjellberg “PewDiePie” and of the Bollywood label T-Series. As The Hacker News reports, TheHackerGiraffe hacked printers worldwide to print pro-PewDiePie propaganda. Here are some images showing the message that printers were forced to spit out:
Read more →