IT threat evolution Q2 2024
In this report, Kaspersky researchers explore the most significant attacks of Q2 2024 that used a XZ backdoor, the LockBit builder, ShrinkLocker ransomware, etc.
More results...
In this report, Kaspersky researchers explore the most significant attacks of Q2 2024 that used a XZ backdoor, the LockBit builder, ShrinkLocker ransomware, etc.
Introduction to Skyfall: This write-up will explore the “Skyfall” machine from Hack the Box, categorized as an easy difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the “Skyfall” machine from Hack The Box by achieving the […]
The post Hack The Box – Skyfall Machine Walkthrough (Insane Difficulty) appeared first on Threatninja.net.
Introduction to Runner: This walkthrough will explore the “Runner” machine from Hack the Box, categorized as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the “Runner” machine from Hack The Box by achieving the following […]
The post Hack The Box: Runner Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.
Introduction to Formulax: This walkthrough will explore the “Formulax” machine from Hack the Box, categorized as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the “Formulax” machine from Hack The Box by achieving the […]
The post Hack The Box – Formulax Machine Walkthrough (Hard Difficulty) appeared first on Threatninja.net.
In this post, I would like to share a walkthrough of the Usage Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Usage machine? For the user flag, you need to abuse blind SQL injection vulnerability in a password reset form, which I exploited to dump the database […]
The post Hack The Box: Usage Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.
In this post, I would like to share a walkthrough of the Iclean Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Iclean machine? For the user flag, you need to examine a Flask web application and find an XSS vulnerability to capture a session cookie. […]
The post Hack The Box: Iclean Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.
In this post, I would like to share a walkthrough of the Headless Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Headless machine? For the user flag, you need to exploit a Cross-Site Scripting (XSS) vulnerability, we will capture the session cookie of the administrator […]
The post Hack The Box: Headless Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.
In this post, I would like to share a walkthrough of the Corporate Machine from Hack the Box This room will be considered an Insane machine on Hack the Box What will you gain from the Corporate machine? For the user flag, you need to abuse a complex XSS attack that involves two HTML injections and a dynamic JavaScript injection […]
The post Hack The Box: Corporate Machine Walkthrough – Insane Difficulty appeared first on Threatninja.net.
In this post, I would like to share a walkthrough of the Perfection Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Perfection machine? For the user flag, you need to abuse the vulnerability that identified was in the “weighted grade calculator” application on the web […]
The post Hack The Box: Perfection Machine Walkthrough – Easy Diffucility appeared first on Threatninja.net.
In this post, I would like to share a walkthrough of the Drive Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Drive machine? For the user flag, you will need to exploit an IDOR vulnerability that allows me to gain unauthorized access to the administrator’s […]
The post Hack The Box: Drive Machine Walkthrough – Hard Difficulty appeared first on Threatninja.net.