2025
12
React2Shell Lab
React2Shell Lab
React2Shell (CVE-2025-55182 / CVE-2025-66478) vulnerability lab - Learn to detect and exploit vulnerable Next.js applications
root&beer
Vulnerability Scanning
Vulnerability scanning identifies security weaknesses, misconfigurations, and known vulnerabilities in systems and services.
root&beer
Web Enumeration
Identifying security weaknesses and CVEs
root&beer
Service Enumeration
Service enumeration gathers detailed information about running services, including versions and configurations, to identify weaknesses and viable attack paths.
root&beer
Port Scanning
Methods for discovering open ports
root&beer
Host Discovery
Techniques for identifying active systems.
05
Mr Robot 1: Vulnhub Walkthrough
Mr Robot 1: Vulnhub Walkthrough
This is a walkthrough of the Mr. Robot themed Vulnhub box, located here: https://www.vulnhub.com/entry/mr-robot-1,151/
2024
10
Jo2024: HackMyVM Walkthrough
Jo2024: HackMyVM Walkthrough
A medium CTF challenge that demonstrates a PHP Cookie Serialization Attack via preferences.php, leading to a reverse shell. Discover how the .Xauthority file was exploited to capture sensitive data, and learn about privilege escalation techniques used to gain root access without a password.
08
Photographer 1: Vulnhub Walkthrough
Photographer 1: Vulnhub Walkthrough
Photographer contains multiple exploits and misconfigurations. Starting with retrieving credentials from Samba shares then exploiting Koken CMS to gain a reverse shell. LinPEAS revealed MySQL credentials and a SUID PHP binary, enabling privilege escalation to root.
Ephemeral 3: HackMyVM Walkthrough
Ephemeral 3: HackMyVM Walkthrough
This box is exploited using OpenSSL's predictable PRNG to brute-force an SSH key, gaining access as another user. A sudo misconfiguration is then used to modify /etc/passwd, adding a root user, allowing privilege escalation and capturing the final flag.
Ephemeral 2: HackMyVM Walkthrough
Ephemeral 2: HackMyVM Walkthrough
Ephemeral 2 is a medium-level box involving Samba exploitation, reverse shells, and privilege escalation. Key steps include discovering open ports, brute-forcing SMB credentials, exploiting a "magic script," and leveraging cron jobs and writable profile scripts to gain root access..
Corrosion 1: Vulnhub Walkthrough
Corrosion 1: Vulnhub Walkthrough
The "Corrosion: 1" CTF involved exploiting log poisoning and path abuse for remote command execution and privilege escalation. Key steps included cracking a ZIP file password and exploiting a vulnerable script to gain root access, culminating in the capture of the root flag.
Web Machine N7: Vulnhub Walkthrough
Web Machine N7: Vulnhub Walkthrough
Vulnhub's Web Machine N7. Labeled as a medium difficulty box with a lot of directory enumeration and some use of sqlmap
Corrosion 2: Vulnhub Walkthrough
Corrosion 2: Vulnhub Walkthrough
Walkthrough of Corrosion 2 vulnhub box. This is considered to be a medium level that involves zip file password cracking and RCE via tomcat protocol.
07
Matrix 2: Vulnhub Walkthrough
Matrix 2: Vulnhub Walkthrough
A walkthrough of VulnHub's Matrix: 2 box. It is an intermediate challenge with directory traversal, password cracking and steganography.
Matrix 1: Vulnhub Walkthrough
Matrix 1: Vulnhub Walkthrough
A walkthrough of vulnhub's Matrix: 1 box. It is an intermediate box that involves brute force and breaking out of a restricted shell.