In my free time, I enjoy meditating, taking long walks, cooking, and challenging myself by hacking machines from platforms like Vulnhub or Crackme.one.
In my free time, I enjoy meditating, taking long walks, cooking, and challenging myself by hacking machines from platforms like Vulnhub or Crackme.one.
I have promised myself to read a book monthly, apart from my regular work, and as for the month of August, I decided to read a book called “Stages of Meditation”. This book was composed by Acharya Kamalashila (A Nalanda Scholar who was invited to Tibet by the King of Tibet; in the 8th century), and His Holiness the Dalai Lama has given many teachings of it. I highly recommend this book to all the…
Target Machine Name: Symfonos Information in our hand: Kali Linux IP Machine: 192.168.56.102 Got get the victim machine IP address: netdiscover -i eth0 -r 192.168.56.102/24 Victim or Target Machine IP: 192.168.56.101 Step 01: Active Scanning nmap -sC -sV -p- -T4 -A 192.168.56.101 -oN nmap.log Service Info: Hosts: symfonos.localdomain, SYMFONOS; OS: Linux; Host script results: |_nbstat: NetBIOS name: SYMFONOS, NetBIOS user: <unknown>, NetBIOS | smb-os-discovery: | OS: Windows 6.1 (Samba 4.5.16-Debian) | Computer name: symfonos |…
Overview: Kali Linux IP address: 192.168.56.102 PumpkinGarden IP address: 192.168.56.101 Step 01: nmap -sC -sV -p- -A -T4 192.168.56.101 -oN nmap.log Output: 21/tcp open ftp vsftpd 2.0.8 or later 1515/tcp open http Apache httpd 2.4.7 ((Ubuntu)) 3535/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 Step 02: Visit: http://192.168.56.101:1515 View Source: (no robots.txt) Although green comment seems to be given me some tips but I can’t get it. So, I followed my usual methodology; which is clicking…
Kioptrix2014 is one of the most recommended machines to play around prior to OSCP preparation. Therefore, I am very much eager to shell the box 🙂 Setup: mountroot> ufs:/dev/ada0p2 ***** Kali Machine IP: 192.168.56.102 Step 0: ifconfig Kioptrix Machine IP: 192.168.56.101 (how? ) Step 1: nmap -sn 192.168.56.102/24 -sn SYN pack Step 2: nmap -sC -sV -p- -A -T4 192.168.56.101 -oN nmap.log Ouput: PORT STATE SERVICE VERSION 22/tcp closed ssh 80/tcp open http Apache…
Around five years back, I had the privilege to learn buffer overflow from one of my dear mentor. Nevertheless, due to changes in the nature of my work, I didn’t get proper time to explore more. Many of my colleague had shared me their challenges to understanding the concept, despite they were comfortable in programming; I had the other way round experience. I enjoyed the subject back then and perhaps I could say that I…