Tibetan, Cybersecurity enthusiast, I design and develop website using #WordPress to pay bill.

Blog.

  • 30 Days Challenge: Day 02

    Hello everyone, I am logging here the second day of my 30 days challange. Today, I was not able to read much from the book however, I am happy to share with you all a bash tool which can automate you to check whether it is suspicious or not based on the virustotal engine. By the way, you might experience the slowness of the tool, it is because of the rate limit set by the…

  • 30 Days Challenge: Day 01

    Tashi Delek everyone, I hope you all are doing well 🙂  I know the way how I present my blog doesn’t attract much people, and those who read my blogs were either my old friends or new friends who I have met you somewhere and I had shamelessly bragged about my blog. The quality of the blog is still kind of crude, for which I am working on. I hope you will see the progress.…

  • Exploiting Windows & Privilege Escalation from TryHackMe (ICE Room)

    Recon NMAP SYN Scan sudo nmap -sS -p- 10.10.185.210 -Pn -o nmap.log For some reason, my nmap is taking a lot of time (perhaps I ran -p-  it means to enumerate all 65535 ports). Anyway, I quickly ran rustscan to get the ports. rustscan -a 10.10.185.210 --range 1-65535 ----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| |…

  • Steel Mountain with and without using Metasploit

    In this room you will enumerate a Windows machine, gain initial access with Metasploit, use Powershell to further enumerate the machine and escalate your privileges to Administrator. If you don’t have the right security tools and environment, deploy your own Kali Linux machine and control it in your browser, with our Kali Room. Please note that this machine does not respond to ping (ICMP) and may take a few minutes to boot up. Task 1:…

  • This is NullByte from vulhub

    Overview: Target Machine IP Address: 192.168.56.122 My Machine IP Address: 192.168.56.117 Mission: Boot to Root Get to /root/proof.txt and follow the instructions. Level: Basic to intermediate. Description: Boot2root, box will get IP from dhcp, works fine with virtualbox&vmware. Hints: Use your lateral thinking skills, maybe you’ll need to write some code. Download: You can download the machine from here. Information Gathering & Scanning Process: sudo arp-scan --interface=eth1 192.168.56.1/24 nmap -sC -sV -p- -Pn 192.168.56.122 -o…

Contact me.

    Back to top button