zacheller@home:~/blog$

  • Vulnhub - InfoSec Prep: OSCP

    The InfoSec Prep Discord server was giving away a OSCP voucher code to 10 random people who solved this Vulnhub box and messaged the root flag to the TryHarder bot, so I entered the competition to test my luck. Here’s my solution to the challenge. Enumeration root@kali:~/Security/Vulnhub/oscp-voucher-chall# portscan 192.168.1.207 Open...

  • Trend Micro Threat Defense Challenge - XDR Edition

    Prompt Think you have what it takes to beat a hacker? Join us for the Trend Micro Threat Defense Challenge: XDR Edition and see! Put your skills to the test as you stop a cyberattack in real time. For 45 minutes, compete alongside your peers to win big prizes, and...

  • OverTheWire - Leviathan 0-7

    Prompt Dare you face the lord of the oceans? Leviathan is a wargame that has been rescued from the demise of intruded.net, previously hosted on leviathan.intruded.net. Level 0 leviathan0:leviathan0 Check the hidden .backup folder, and look through the long bookmarks file. leviathan0@leviathan:~/.backup$ grep leviathan bookmarks.html <DT><A HREF="http://leviathan.labs.overthewire.org/passwordus.html | This will...

  • Vulnhub - DC: 4

    Enumeration Nmap root@kali:~/Security/Vulnhub/DC-Series/4# portscan 10.10.10.9 Open ports: 22,80 Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-02 18:57 EDT Nmap scan report for bastard.htb (10.10.10.9) Host is up (0.00029s latency). PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u6 (protocol 2.0) | ssh-hostkey: | 2048 8d:60:57:06:6c:27:e0:2f:76:2c:e6:42:c0:01:ba:25 (RSA) | 256...