Handshakeharvest2024.zip
Introduction to handshakeharvest2024.zip package The following program handshakeharvest2024.zip has been released for community use. You can download at:...
View ArticleBurp not intercepting brute-force attempts
I am at the second part in login brute forcing skills assessment - website, and I can’t get burp to intercept requests from hydra. However, when I manually enter credentals into the login page, they...
View ArticleSetting up windows
I’m in the setting up Windows module and I just downloaded and installed the virtual Wondows machine. I am at the point lf the lesson labeled Core changes now. This is were i am to execute a bunch of...
View ArticleLooking for people to join in my journey
I have seen the dude who finish hack the box and got inspired to do the same! I’m currently doing all the forensic active challenges. If someone want to join or is in similar path it would be good to...
View ArticleCannot Access Unified's Webpage
Hi there, I’ve been trying to access the Unified Machine’s webpage on Starting Point, but it doesnt load after putting the IP address into Firefox. Something I’ve noticed as well is that the nmap scan...
View ArticleZap Web Scanner within the Bug Bounty Hunting Cert
I am desparate for help on finding the flag in the Zap scanner task, I can never find any High alert level addresses with the exception of one which does not lead me to the OS alert it looks like i...
View ArticleVirtual Hosts - Task - 1st question
Hey All, Completely stuck on the first question in the tasks. Brute-force vhosts on the target system. What is the full subdomain that is prefixed with “web”? Answer using the full domain, e.g....
View ArticleInitial Foothold, gobuster issue/nibble
Hi all I cannot get gobuster to tell me error parsing. I get it to work using the exact syntax below and it works on my parallels machine but not on HTB vm. I cannot get past this part any help would...
View ArticleUsage writeup by evyatar9
Read mt writeup to Usage machine on: github.com Writeups/HackTheBox/Usage at master · evyatar9/Writeups This repository contains writeups for various CTFs I've participated in (Including Hack The...
View ArticleMailing writeup by evyatar9
Read my writeup for Mailing machine on: github.com Writeups/HackTheBox/Usage at master · evyatar9/Writeups This repository contains writeups for various CTFs I've participated in (Including Hack The...
View ArticleUse WMI to find the serial number of the system
Continuing the discussion from Use WMI to find the serial number of the system: Can you provide na explantion about from where did it came from ? 1 post - 1 participant Read full topic
View ArticleUnderstanding the wordpress FILEPATH option in an MSF exploit
Fellow Hackers, I ran a wordpress plugin backup exploit and I had to set a FILEPATH variable to ‘/flag.txt’ to obtain the flag. By default the path says ‘/etc/passwd’. What I am trying to understand...
View ArticleNeed help on - Find The Easy Pass 2024.10.15
Hi everyone, I’m working on the “Find The Easy Pass” challenge and have reached the point where I have the zip file: Find The Easy Pass.zip. I’ve been trying to unzip it using the password:...
View ArticleUse cURL from your Pwnbox (not the target machine) to obtain the source code...
You can use this command to answer the question with what you learned in the module curl -s https://www.inlanefreight.com | tr " " “\n” | grep -oE ‘https://www.inlanefreight.com/([^#"]+)’ | sort -u |...
View ArticleHost unreachable
Hello everybody. I am new here and i just started using HTB PWNbox. I am trying to ssh to 10.129.25.253 but i am getting error. Also i am trying to ping this host and it is unreachable. Does this...
View ArticleBackdoor communication failed - weevely 4.0.2
why this error occur i can not modifiying the file shell2.php For more details please visit this link please help me out of this i am working on it last 2 weeks github.com/epinna/weevely3 Backdoor...
View ArticleEvilCUPS - HackTheBox WriteUp en Español
URL: Yw4rf WriteUp de la máquina EvilCUPS de HackTheBox en Español. Atte: Yw4rf 1 post - 1 participant Read full topic
View ArticleCap - HackTheBox WriteUp en Español
URL: Yw4rf En esta ocasión, abordaremos la máquina Cap. Nos encontraremos con varios puertos: 80/HTTP, 21/FTP y 22/SSH. Utilizaremos Tshark para analizar paquetes de archivos .PCAP, Fuzzing web para...
View ArticleTwoMillion - HackTheBox WriteUp en Español
URL: Yw4rf TwoMillion es una máquina de la plataforma HackTheBox. En esta ocasión nos encontraremos con dos puertos abiertos 22/SSH y 80/HTTP. Obtendremos un codigo de invitación descifrando código...
View ArticleNibbles Pentest Report
This report is too big to format into HTML code onto the website and was denied when first uploaded. This is where this report is located This is a link to Old Dominion Universities’ OneDrive where...
View ArticleBoardLight writeup by evyatar9
Read my writeup to BoardLIght machine on: github.com Writeups/HackTheBox/BoardLight at master · evyatar9/Writeups This repository contains writeups for various CTFs I've participated in (Including...
View Article𝗢𝗽𝘁𝗶𝗺𝗶𝘇𝗶𝗻𝗴 𝗦𝗤𝗟 𝗜𝗻𝗷𝗲𝗰𝘁𝗶𝗼𝗻 𝘄𝗶𝘁𝗵 𝗦𝗤𝗟𝗠𝗮𝗽: 𝗔 𝗣𝗿𝗮𝗰𝘁𝗶𝗰𝗮𝗹 𝗚𝘂𝗶𝗱𝗲
A tool is only as effective as its operator. Properly utilizing flags can significantly enhance the efficiency, confidence, and success rate of injection testing. 𝗞𝗲𝘆 𝗥𝗲𝗰𝗼𝗺𝗺𝗲𝗻𝗱𝗮𝘁𝗶𝗼𝗻𝘀 • --𝘩𝘦𝘭𝘱 or...
View ArticlePassword Attacks Module
Hello colleagues I am trying to install crackmapexec on HTB terminal to pass the module but constantly I am getting one and the same issue that the problem is python3-neo4j. Used pip and other tools...
View ArticleTelnet and Root login
Hi this is the question on the Hack the box Meow section: What username is able to log into the target over telnet with a blank password? I used putty to connect the HTB Viewer to see am I be able to...
View ArticleNeed Help
The answer is coming worng even when i feel its right on Windows command line introduction 2 posts - 2 participants Read full topic
View Article