Skip to main content

Posts

2019


ROP - ret2libc attack

·1873 words·9 mins
Today, I will show you how to use Return Oriented Programming for doing a ret2libc attack. Foreword #This is much more harder than what we encountered earlier, unlike before we won’t have any function preloaded with strings like /bin/cat flag.

Vulnhub - Pumpkin Festival

·547 words·3 mins
Today, we are going to pwn Pumpkin Festival from Vulnhub. Nmap #Starting off with the nmap using nmap -sV -sC -A -p- -T5 192.168.43.17 reveals that we have FTP, HTTP and SSH at 6880.

Introduction to ROP

·617 words·3 mins
This blog post will let you know about the ROP or Return Oriented Programming. What is ROP? #Return Oriented Programming is a modern method of exploiting a binary that will allow us to take control of the stack and the abuse program’s control flow by the help of gadgets.

Vulnhub - Symfonos-2

·613 words·3 mins
Today, we are going to pwn Symfonos 2 from Vulnhub. Nmap #Starting off with Nmap, using nmap -sV -sC -A -p- -T5 192.168.43.85 shows that we have FTP, SSH, HTTP and SMB port.

Vulnhub - PumpkinRaising

·879 words·5 mins
Today, we are going to pwn PumpkinrRaising from Vulnhub. Nmap #Starting off with nmap and using nmap -sV -sC -A -p- -T5 192.168.43.92 shows that only 2 ports are opren 22, 80.

Hack The Box - Friendzone

·566 words·3 mins
Today, we are going to pwn Friendzone from Hack The Box. Methodology # Nmap scan of the machine Checking SMB service and HTTP Using dig to get subdomians Uploading PHP reverse shell Callback the reverse shell by exploiting LFI(Local File Inclusion) Getting user flag and SSH credentials Using cronjob to get root flag Nmap #Starting off with the nmap, nmap -sV -sC -A 10.