Hack the Box: MonitorsTwo Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the MonitorsTwo Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the MonitorsTwo machine? For the user flag, you will need to abuse the vulnerability that is related to cacti version 1.2.22 […]

The post Hack the Box: MonitorsTwo Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

September 2, 2023
Read More >>

How Enums in Python Improve Code Readability

Enums are a popular data type in programming languages such as C, C++, and Java. They help you write type-safe and more readable code. In Python, enums were not always supported. However, since version 3.4, Python now supports enums. This article is a …

August 31, 2023
Read More >>

HackTheBox: OnlyforYou Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the OnlyforYou Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the OnlyforYou machine? For the user flag, you will need to able to read different files throughout an LFI Vulnerability that […]

The post HackTheBox: OnlyforYou Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.

August 26, 2023
Read More >>

[SANS ISC] Python Malware Using Postgresql for C2 Communications

Today, I published the following diary on isc.sans.edu: “Python Malware Using Postgresql for C2 Communications“: For modern malware, having access to its C2 (Command and control) is a crucial point. There are many ways to connect to a C2 server using tons of protocols, but today, HTTP remains very common

The post [SANS ISC] Python Malware Using Postgresql for C2 Communications appeared first on /dev/random.

August 25, 2023
Read More >>

[SANS ISC] Have You Ever Heard of the Fernet Encryption Algorithm?

Today, I published the following diary on isc.sans.edu: “Have You Ever Heard of the Fernet Encryption Algorithm?“: In cryptography, there is a gold rule that states to not develop your own algorithm because… it will be probably weak and broken! They are strong algorithms (like AES) that do a great job

The post [SANS ISC] Have You Ever Heard of the Fernet Encryption Algorithm? appeared first on /dev/random.

August 22, 2023
Read More >>

Hack The Box: Busqueda Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Busqueda Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Busqueda machine? For the user flag, you will need to exploit the application which relied on the outdated software component […]

The post Hack The Box: Busqueda Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

August 12, 2023
Read More >>