HackTheBox Starting Point: Synced Walkthrough
In this post, we’ll walk through the process of enumerating and exploiting an unsecured Rsync service to retrieve sensitive information. This attack is commonly seen in misconfigured systems where Rsync is left open without authentication, allowing unauthorized users to access shared files. Let’s dive into the details of how we discovered, accessed, and extracted data from the target system.
344 words
|
2 minutes

HackTheBox Starting Point: Explosion Walkthrough
This is my personal notes for HTB Explosion Machine
355 words
|
2 minutes

HackTheBox Starting Point: Redeemer Walkthrough
This is my personal notes for HTB Redeemer Machine
206 words
|
1 minutes

HackTheBox Starting Point: Dancing Walkthrough
This is my personal notes for HTB Dancing Machine
562 words
|
3 minutes

HackTheBox Starting Point: Fawn Walkthrough
This is my personal notes for HTB Fawn Machine
401 words
|
2 minutes

HackTheBox Starting Point: Meow Walkthrough
This is my personal notes for HTB Meow Machine. Since this is just a starting point, I will provide a quick and short walkthrough for my notes.
468 words
|
2 minutes
