Hack The Box Write-Up: Previse
Web exploitation challenge involving Execute After Redirect (EAR) analysis and command injection to gain initial access, culminating in root privileges via sudo PATH injection.
Cybersecurity writeups, technical deep-dives, and random thoughts
Web exploitation challenge involving Execute After Redirect (EAR) analysis and command injection to gain initial access, culminating in root privileges via sudo PATH injection.
Exploiting path traversal and insecure dynamic class loading vulnerabilities in an Android APK to achieve code execution.
Analyzing and decrypting a custom secure communication protocol to intercept adversary communications.
Exploiting authentication vulnerabilities in a web API to gain unauthorized access and extract sensitive information.
Reverse engineering a malware dropper to decrypt embedded shellcode and extract C2 infrastructure details.
Memory dump analysis and reverse engineering of fileless malware that hijacks DNS to compromise package repositories.
Network traffic analysis to identify malicious DNS hijacking activity and enumerate compromised router IP addresses.
Forensic analysis of a compromised development machine to identify suspicious artifacts in an EXT2 filesystem image.