Bulldog 1 – walkthrough

Description from Vulnhub: “Bulldog Industries recently had its website defaced and owned by the malicious German Shepherd Hack Team. Could this mean there are more vulnerabilities to exploit? Why don’t you find out? 🙂 This is a standard Boot-to-Root. Your only goal is to get into the root directory and see the congratulatory message, howContinue reading “Bulldog 1 – walkthrough”

Wallaby’s Nightmare – Walkthrough

This segment of my Vulnhub series covers my walkthrough for the “Wallaby’s Nightmare (v1.0.2)” game. Finding Host and uncover services As always, I began finding the address of the game: Command sudo nmap -sn 192.168.110.0/24 In my case, target got assigned IP address 192.168.110.11. Then moved on uncovering services: Command sudo nmap -p1-65535 -A -T4Continue reading “Wallaby’s Nightmare – Walkthrough”

Breach: 2.1 – walkthrough

Breach 2.1 is a boot2root/CTF challenge that attempts to showcase a real-world scenario. The challenge is provided as a VM configured with a static IP (192.168.110.151). The following blog post is my log from playing this challenge. Test lab environment As usual my test lab consists of: Virtual Box Parrot OS Breach 2.1 VM InitialContinue reading “Breach: 2.1 – walkthrough”

Exif XSS using JPEG as media

Ever heard about Exif and why it potentially can put a web site in danger? Exif is an abbreviation for “Exchangeable Image File Format”. Technically it is a file format for storing information in media files. The specification uses the JPEG discrete cosine transform (DCT) for compressed image files and TIFF for uncompressed image files. It alsoContinue reading “Exif XSS using JPEG as media”