Bruteforce

root&beer
139,445: SMB
SMB penetration testing guide covering share enumeration, authentication testing, Null session exploitation, and SMB vulnerability assessment using tools like Enum4linux, Smbclient, and Impacket for Windows network security testing.
root&beer
21: FTP
FTP penetration testing guide covering anonymous login testing, brute force attacks, banner grabbing, and file transfer exploitation using tools like Nmap, Hydra, and Netcat for security assessments and ethical hacking.
Mr Robot 1: Vulnhub Walkthrough
Mr Robot 1: Vulnhub Walkthrough
This is a walkthrough of the Mr. Robot themed Vulnhub box, located here: https://www.vulnhub.com/entry/mr-robot-1,151/
Ephemeral 3: HackMyVM Walkthrough
Ephemeral 3: HackMyVM Walkthrough
This box is exploited using OpenSSL's predictable PRNG to brute-force an SSH key, gaining access as another user. A sudo misconfiguration is then used to modify /etc/passwd, adding a root user, allowing privilege escalation and capturing the final flag.
Ephemeral 2: HackMyVM Walkthrough
Ephemeral 2: HackMyVM Walkthrough
Ephemeral 2 is a medium-level box involving Samba exploitation, reverse shells, and privilege escalation. Key steps include discovering open ports, brute-forcing SMB credentials, exploiting a "magic script," and leveraging cron jobs and writable profile scripts to gain root access..
Matrix 1: Vulnhub Walkthrough
Matrix 1: Vulnhub Walkthrough
A walkthrough of vulnhub's Matrix: 1 box. It is an intermediate box that involves brute force and breaking out of a restricted shell.