Tibetan, Cybersecurity enthusiast, I design and develop website using #WordPress to pay bill.

Blog.

  • How I took down EvilBox from vulnhub

    Overview: Target Machine IP Address: 192.168.56.120 My Machine IP Address: 192.168.56.117 Mission: Boot to Root To get a user and a root flag To get root access Description: As a preparation for the upcoming CEH practical Exam, I am going to take down this box. It is rated as easy so let me drive into it. Because I want to increase my craving. Once I gets comfortable with the easy boxes, I want to go…

  • How I took down Mercury

    Overview: Target Machine IP Address: 192.168.56.119 My Machine IP Address: 192.168.56.117 Mission: Boot to Root To get root flag To get root access Description: "Oh no our webserver got compromised. The attacker used an 0day, so we dont know how he got into the admin panel. Investigate that. This is an OSCP Prep Box, its based on a CVE I recently found. Its on the OSCP lab machines level.” Level: Easy/Medium  Easy/Medium (Although it was…

  • Let’s take down JANGOW 01

    Overview: Target Machine IP Address: 192.168.56.118 My Kali Machine IP Address: 192.168.56.117 Mission: Boot to Root 1. To get user flag 2. To get root flag 3. To get root access Level: Easy/Medium Easy

  • How I took down Momentum2

    Overview: Target Machine IP Address: 192.168.56.125 My Machine IP Address: 192.168.56.1 Mission: Boot to Root To get user flag To get root flag To get root access Level: Easy/Medium  Easy/Medium Download: You can download the machine from here. Information Gathering & Scanning Process: sudo arp-scan --interface=vboxnet0 192.168.56.1/24 Target IP: 192.168.56.125 nmap -sC -sV -p- -Pn 192.168.56.125 -o nmap.log PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) | ssh-hostkey: | 2048…

  • Tiki CTF walkthrough

    Overview: Target Machine IP Address: 192.168.56.103 My Machine IP Address: 192.168.56.1 Mission: Boot to Root To get root flag To get root access Description: "Oh no our webserver got compromised. The attacker used an 0day, so we dont know how he got into the admin panel. Investigate that. This is an OSCP Prep Box, its based on a CVE I recently found. Its on the OSCP lab machines level.” Level: Easy/Medium  Easy/Medium Download: You can…

Contact me.

    Back to top button