The ultimate guide to HTTP request & response headers

End-users constantly make GET or POST request to the internet to retrieve information. The most common protocol used here is HTTP/S. But this communication is not just about making requests. It needs to be meaningful when sent from client to server or vice-versa. Here’s when HTTP header comes in. With headers, client/server can send additional information with HTTP request. In this blog…

0 Comments

Buff hackthebox walkthrough

Hey there! This is Shreya and today I am gonna show you how to pwn buff from hackthebox. Buff is an easy level windows machine having a straightforward way to obtain initial foothold. Privilege escalation to Administrator requires to abuse a service that has its exploit available on exploit-db, still its tricky to get through. With that being said, let's get started.…

4 Comments

My experience at first Nullcon!

Most often people plan a trip to Goa for its beaches, the exotic cashew wine, the breathtaking sceneries and the elegant casinos. But for me, the reason was quite different. Its Nullcon. It was their 10th anniversary, after missing so many years of exclusive seminars and a bunch of elite sessions at a prime venue, I finally got my first chance to…

0 Comments

Remote Hackthebox walkthrough

Hey fellas!! Its time for remote from hackthebox. This was an easy Windows machine. The initial foothold for the machine was based on CVE of a CMS and has a straight-forward privilege escalation to Administrator.With all that said, let’s get started!! Scan the host for the open ports and services. # nmap -sC -sV -oA remote.nmap 10.10.10.180 The output revealed 3 interesting…

1 Comment

Canape hackthebox Writeup

Hey pentesters! In this post blog post, I am gonna walk you through canape that is a medium linux machine from hackthebox. Summary The initial foothold on the box is based on python pickle injection that leads to remote code execution. Privilege escalation to user exploits a vulnerability in couchdb that can be leveraged to create a dummy user with _admin role.…

0 Comments

Admirer : Hackthebox Walkthrough

Hi! This is Shreya Pohekar. And Today, its time for Admirer from hackthebox. So it was an "easy" rated machine, still, it needed a vigilant eye to make it through. Summary The initial foothold on the box required a lot of enumeration. The creators of the box really wanted to take a note of every detail. Getting the user required to have…

8 Comments

How to get into information security

The internet is on a boom. Enterprises being small or large, and individuals have completely moved over to the virtual world. I get so intimidated by the fact that one just need a laptop and internet and you possess the power to transform the generations!! Internet provided us with endless capabilities but the greater the presence, greater is the security risk!! Why…

0 Comments

Automatic backup of folder contents on Github

We generate enormous amount of data everyday working with virtual machines. Several file are so important that one cant afford to loose them. But what if, oneday you realize that you virtual machine has crashed due to some reason and all your data is gone forever. Seems like a nightmare that no-one wanna encounter. Most of us take file backup on github,…

1 Comment

Blunder: Hackthebox Walkthrough

Hey all! In this blog post, we’ll be walking through blunder from hackthebox. Blunder is an easy level linux machine.   Summary The initial foothold on the box requires a bit of enumeration to find out the correct user who can login into CMS:- bludit. There is the file upload vulnerability on the cms that gets the initial shell on the box.…

12 Comments