Sign in

This is my next blog on experience performing penetration testing on the easy retired machine Shocker from Hack The Box. This machine runs on the Linux Operating System with the IP address 10.10.10.56.

The first step is the process of reconnaissance using nmap that can help us find the open…


This is my next blog on penetration testing an easy retired machine from Hack The Box called Mirai. This machine runs on Linux Operating System with the IP address 10.10.10.48.

First is the step of reconnaissance that can be done by using nmap scanning which helps us in identifying the…


This is my next blog on my experience of exploiting the machine Granny from Hack The Box. This is another easy machine of Windows Operating System with the IP address of 10.10.10.15.

The first step is the process of reconnaissance that can help us find the vulnerable open ports that…


This is my next blog on my penetration experience of exploiting a retired machine Beep from Hack The Box. This is an easy Linux machine with IP address 10.10.10.7.

The first step is the process of reconnaissance that can help us in scanning the ports that are open and can…


This is my next blog on the machine Devel from Hack The Box. This is an easy retired machine and can be exploited using metasploit. The IP address of the machine is 10.10.10.5 with a Windows Operating System.

The first step is the process of reconnaissance that is done by…


This is yet another blog on machine Optimum from Hack The Box. It is a retired Windows-based machine with the IP address 10.10.10.8.

The first step is the process of reconnaissance that can help in identifying the ports that are open and can be exploited.


This is my next write-up that details my experience on doing penetration testing with the Hack The Box. Legacy is yet another retired windows machine that has the SMB vulnerabilities that we try exploiting using the Metasploit by generating payloads and shellcodes. The IP address of the machine is 10.10.10.4.


Lame is yet another easy retired machine in Hack The Box. This is based on the Linux Operating system and the exploitation of smbd vulnerabilities.

First is the process of reconnaissance that is done using nmap scanning which helps us find the open ports.


This is another blog on my experience of exploiting a Windows-based retired machine with the IP address 10.10.10.95.

The first step is the reconnaissance process by using nmap that helps in identifying the open ports.


This is a Windows host that has an smb version that is vulnerable to the eternalblue exploit with the IP address 10.10.10.40. This was leveraged to gain a shell as nt authority\system.

The first step is the processes of reconnaissance by doing Nmap scan to check for the open ports.

Subashri

Cybersecurity Graduate

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store