Linux
Hack The Box - Mongod
· ☕ 5 min read · ✍️ Atom
mongod from HackTheBox is an retired machine which is vulnerable to security Misconfiguration, which can be exploited with help of default credential

Hack The Box - Explosion
· ☕ 5 min read · ✍️ Atom
Explosion from HackTheBox is an retired machine which is vulnerable to Telnet and security Misconfiguration, which can be easily exploited with help of Basic Recon

Hack The Box - Redeemer
· ☕ 4 min read · ✍️ Atom
Redeemer from HackTheBox is an retired machine which is vulnerable to Redis and security Misconfiguration, which can be easily exploited with help of Basic Recon

Hack the Box - Dancing
· ☕ 7 min read · ✍️ Atom
Dancing from HackTheBox is an retired machine which is vulnerable to security Misconfiguration FTP , which can be easily exploited with help of Basic Recon

Hack The Box - Meow
· ☕ 4 min read · ✍️ Atom
Meow from HackTheBox is an retired machine which is vulnerable to Telnet and security Misconfiguration, which can be easily exploited with help of Basic Recon

Hack The Box - Nibbbles
· ☕ 8 min read · ✍️ Atom
Nibbles from HackTheBox is an retired machine which is vulnerable to File upload and security Misconfiguration, which can be easily exploited with publicly available scripts and Metasploit

Hack The Box - Lame
· ☕ 13 min read · ✍️ Atom
Lame from HackTheBox is an retired machine which is vulnerable to infamous CVE - 2007-2447 & 2004-2687 SMB vulnerabilities which can be easily exploited with publicly available scripts and Metasploit

Vulnhub - Kioptrix Level 1
· ☕ 18 min read · ✍️ Atom
This Kioptrix VM Image are easy challenges. The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player). The purpose of these games are to learn the basic tools and techniques in vulnerability assessment and exploitation. There are more ways then one to successfully complete the challenges.

Try Hack Me - Vulnversity
· ☕ 7 min read · ✍️ Atom
vulnversiy was the first box towards offensive security path. we found web portal running on port 3333 using gobuster we found some directory's, which helps To upload our shell codes. with help of securifera github page we can able to identify correct file extension, gained user shell using php-reverse-shell and escalated privilege using SUID bit binary with help of Gtfobins.