HTB: Investigation

Por um escritor misterioso
Last updated 14 março 2025
HTB: Investigation
Investigation starts with a website that accepts user uploaded images and runs Exiftool on them. This version has a command injection. I’ll dig into that vulnerability, and then exploit it to get a foothold. Then I find a set of Windows event logs, and analyze them to extract a password. Finally, I find a piece of malware that runs as root and understand it to get execution.
HTB: Investigation
Enhance digital forensics and incident response (DFIR) skills with Sherlocks
HTB: Investigation
US Senate investigate Gilead for sofosbuvir price: potential to bankrupt Federal healthcare and add $300 annually to every American insurance premium for the next five years, HTB
HTB: Investigation
Hack The Box
HTB: Investigation
HTB Investigation. The machine consist of exploiting…, by Damaidec
HTB: Investigation
Walk-through of Union from HackTheBox
HTB: Investigation
HTB: Investigation
HTB: Investigation
Investigation ( Hack the box). CVE-2022–23935, Microsoft Message…, by Fallen sky
HTB: Investigation
HTB Cyber Apocalypse 2023: Forensics - forensicskween
HTB: Investigation
HTB: Investigation
HTB: Investigation
HTB Sherlock: i-like-to
HTB: Investigation
Hacking Around: Previse - HTB writeup - SecSI
HTB: Investigation
Hack the Box - Investigation (Medium)

© 2014-2025 likytut.eu. All rights reserved.