HackTheBox Starting Point: Ignition Walkthrough
Ignition merupakan mesin Tier 1 dari seri starting point pada platform HackTheBox. Selama pengerjaan saya menggunakan dua tools untuk menyelesaikan tantangan ini. Tools yang saya gunakan diantaranya nmap dan hydra
477 words
|
2 minutes

HackTheBox Starting Point: Three Walkthrough
Three merupakan mesin Tier 1 dari seri starting pooint pada platform HackTheBox. Untuk menyelesaikan tantangan ini, saya menggunakan beberapa tools yaitu: Nmap, Gobuster, dan awscli
738 words
|
4 minutes

HackTheBox Starting Point: Crocodile Walkthrough
In this walkthrough, we exploit a misconfigured vsFTPd 3.0.3 service and weak credentials to gain initial access and retrieve sensitive information, including a flag.
588 words
|
3 minutes

HackTheBox Starting Point: Responder Walkthrough
Responder adalah mesin Tier 1 dari seri Starting Point pada platform Hack The Box. Selama pengerjaan, saya menggunakan beberapa tools untuk menyelesaikan mesin ini. Tools yang saya gunakan diantaranya: Responder, John the Ripper, dan evil-winrm.
798 words
|
4 minutes

HackTheBox Starting Point: Sequel Walkthrough
In this walkthrough, we will exploit an unsecured MariaDB (MySQL) service to retrieve sensitive data, including a flag stored within the database. Exposed database services are a common misconfiguration in real-world environments, making them prime targets for attackers. Let’s explore how we can enumerate and exploit this vulnerability.
601 words
|
3 minutes

HackTheBox Starting Point: Appointment Walkthrough
In this blog post, we will walk through the process of enumerating and exploiting a misconfigured web application running on an Apache server. Our goal is to gain unauthorized access using SQL Injection and retrieve a hidden flag. This guide covers reconnaissance, discovering a login page, performing SQL Injection, and finally, extracting the flag.
440 words
|
2 minutes

HackTheBox Starting Point: Mongod Walkthrough
In this blog post, we will walk through the process of enumerating and exploiting an unsecured MongoDB instance to retrieve sensitive data. This process involves reconnaissance using Nmap, gaining a foothold through MongoDB shell access, and extracting valuable information.
431 words
|
2 minutes

HackTheBox Starting Point: Preignition Walkthrough
Before diving into the exploitation process, we first need to gather intelligence on our target. In this walkthrough, we will explore a machine from HackTheBox’s Starting Point series, named Preignition. Our objective is to enumerate the target, uncover potential vulnerabilities, and ultimately gain access to retrieve the flag.
326 words
|
2 minutes
