Hack The Box: Runner Machine Walkthrough – Medium Difficulty

Introduction to Runner: This walkthrough will explore the “Runner” machine from Hack the Box, categorized as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the “Runner” machine from Hack The Box by achieving the following […]

The post Hack The Box: Runner Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.

August 24, 2024
Read More >>

Hack The Box – Formulax Machine Walkthrough (Hard Difficulty)

Introduction to Formulax: This walkthrough will explore the “Formulax” machine from Hack the Box, categorized as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the “Formulax” machine from Hack The Box by achieving the […]

The post Hack The Box – Formulax Machine Walkthrough (Hard Difficulty) appeared first on Threatninja.net.

August 17, 2024
Read More >>

Hack The Box: Usage Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Usage Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Usage machine? For the user flag, you need to abuse blind SQL injection vulnerability in a password reset form, which I exploited to dump the database […]

The post Hack The Box: Usage Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

August 10, 2024
Read More >>

Hack The Box: Iclean Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Iclean Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Iclean machine? For the user flag, you need to examine a Flask web application and find an XSS vulnerability to capture a session cookie. […]

The post Hack The Box: Iclean Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.

August 3, 2024
Read More >>

Hack The Box: Headless Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Headless Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Headless machine? For the user flag, you need to exploit a Cross-Site Scripting (XSS) vulnerability, we will capture the session cookie of the administrator […]

The post Hack The Box: Headless Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

July 20, 2024
Read More >>

Hack The Box: Corporate Machine Walkthrough – Insane Difficulty

In this post, I would like to share a walkthrough of the Corporate Machine from Hack the Box This room will be considered an Insane machine on Hack the Box What will you gain from the Corporate machine? For the user flag, you need to abuse a complex XSS attack that involves two HTML injections and a dynamic JavaScript injection […]

The post Hack The Box: Corporate Machine Walkthrough – Insane Difficulty appeared first on Threatninja.net.

July 13, 2024
Read More >>

Hack The Box: Perfection Machine Walkthrough – Easy Diffucility

In this post, I would like to share a walkthrough of the Perfection Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Perfection machine? For the user flag, you need to abuse the vulnerability that identified was in the “weighted grade calculator” application on the web […]

The post Hack The Box: Perfection Machine Walkthrough – Easy Diffucility appeared first on Threatninja.net.

July 7, 2024
Read More >>

What is Penetration Testing?

In today’s digital landscape, cybersecurity needs to be prioritized by businesses of all sizes, including small-to-mid-sized businesses (SMBs). As organizations rely heavily on technology to drive their operations, they have become increasingly vulnerable to cyber threats. Fortunately, a powerful tool exists to help SMBs fortify their defenses: penetration testing. Understanding Penetration Testing Penetration testing, or […]

The post What is Penetration Testing? appeared first on TCDI.

April 18, 2024
Read More >>

Hack The Box: Drive Machine Walkthrough – Hard Difficulty

In this post, I would like to share a walkthrough of the Drive Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Drive machine? For the user flag, you will need to exploit an IDOR vulnerability that allows me to gain unauthorized access to the administrator’s […]

The post Hack The Box: Drive Machine Walkthrough – Hard Difficulty appeared first on Threatninja.net.

February 17, 2024
Read More >>

HackTheBox: HyperFileTable Sherlock Walkthrough – Easy Difficulty

In this post, I would like to share some walkthroughs on the Sherlock Challenges such as HyperFiletable which can be considered an Easy difficulty Introduction of Hyperfiletable Challenge In this challenge, you will address the consequences of a sophisticated phishing attack directed at a recent recruit within Forela. Unbeknownst to the unsuspecting newcomer, the act of downloading their onboarding […]

The post HackTheBox: HyperFileTable Sherlock Walkthrough – Easy Difficulty appeared first on Threatninja.net.

February 14, 2024
Read More >>