zacheller@home:~/blog$

  • Webinar - Shellcode for the Masses

    Shellcode for the Masses - Presented by John Hammond - EH-Net - Jan 29, 2020 Ethical Hacking Breakdown Pentesting Network WebApp Mobile Red Teaming Physical SE Forensics System, OS Network Incident Response Threat Hunting Adv Sim Dev Exploit RE What is Shellcode? Code that will return a remote shell when...

  • RiceTeaCatPanda CTF - Writeup

    CTF location: riceteacatpanda.wtf Cryptography Title: Don’t Give The GIANt a COOKie Description: It was just a typical day in the bakery for Delphine. She was preparing her famous chocolate cake, when all of a sudden a GIANt burst through the doors of her establishment and demanded a cookie. Being the...

  • TryHackMe - blue

    Enumeration IP: 10.10.61.181 $ nmap -sV 10.10.61.181 Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-09 16:27 EST Nmap scan report for 10.10.61.181 Host is up (0.16s latency). Not shown: 991 closed ports PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open...

  • TryHackMe - RP-Metasploit

    ## Initializing... Initialize the database with: $ msfdb init We can view some of the advanced options we can trigger for starting the console using the command: $ msfconsole -h Quiet start $ msfconsole -q Check that we’ve connected to the database > db_status msf5 uses postgresql. Rock ‘em to...