Hack The Box: Response Machine Walkthrough – Insane Difficulty

In this post, I would like to share a walkthrough of the Response Machine from Hack the Box This room will be considered an Insane machine on Hack the Box What will you gain from the Response machine? For the user flag, you will need to As for the root flag, you need to Information Gathering […]

The post Hack The Box: Response Machine Walkthrough – Insane Difficulty appeared first on Threatninja.net.

February 6, 2023
Read More >>

Hack The Box: Ambassador Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Ambassador Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Ambassador machine? For the user flag, you will need to abuse the file read vulnerability so that we will be able […]

The post Hack The Box: Ambassador Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.

January 29, 2023
Read More >>

Hack The Box: (UpDown) Upload Phar File for RCE

What is Phar Deserizalition to Remote Code Execution? Phar file also known as PHP Archive will normally contain metadata that is written in a serialized format. As a result, the bad guys can abuse the vulnerability related to deserialized that wrote inside the PHP code. For those who are not familiar with PHP functions that […]

The post Hack The Box: (UpDown) Upload Phar File for RCE appeared first on Threatninja.net.

January 22, 2023
Read More >>

Xerror – An Automated Penetration Testing Tool With GUI

Xerror is an automated pentesting tool, which helps security professionals and nonprofessionals to automate their pentesting tasks. It will perform all tests and, at the end generate two reports for executives and analysts. Xerror provides GUI easy to use menu driven options. Internally it supports openVas for vulnerability scanning, Metasploit for exploitation and gives GUI […]

January 17, 2023
Read More >>

Mongoaudit – An Audit and Pentesting Tool for MongoDB Databases

Databases typically store sensitive data or data that is important for the company. Mongoaudit helps to audit several technical aspects of running a MongoDB instance and get it properly secured. Usage and Audience Mongoaudit is commonly used for Application security or Database security.  Target users for this tool are pentesters, security professionals, and system administrators. […]

January 17, 2023
Read More >>

Learning Series: Docker Escape Method

What is Docker Escape Method? Firstly, we are required to understand the importance of Docker escape or also containers escape which was infrastructure that is used by virtual or day-to-day operations for all enterprises. The case of cybersecurity incidents is been risen nowadays, especially the docker escape which we will be able to learn on […]

The post Learning Series: Docker Escape Method appeared first on Threatninja.net.

January 7, 2023
Read More >>