Sign in

A Beginner’s friendly approach for OSCP ,CTFs and Web App Pen-testing.

Photo by John Schnobrich on Unsplash

Table of Contents

Introduction


Doing all of this in a automated way

Photo by Fatos Bytyqi on Unsplash

Easy boot2root Machine

https://tryhackme.com/room/mustacchio

Summary

NMAP


I made a forum where you can post cute cat pictures!

https://tryhackme.com/room/catpictures

NMAP

PORT     STATE    SERVICE
21/tcp filtered ftp
22/tcp open ssh
2375/tcp filtered docker
4420/tcp open nvm-express
8080/tcp open http-proxy

Security concepts in the form of fun-filled games for Beginners

https://overthewire.org/wargames/bandit/

Level 21 → Level 22

ssh bandit21@bandit.labs.overthewire.org -p 2220

Security concepts in the form of fun-filled games for Beginners

https://overthewire.org/wargames/bandit/

Level 11 → Level 12

ssh bandit11@bandit.labs.overthewire.org -p 2220


Security concepts in the form of fun-filled games for Beginners

https://overthewire.org/wargames/bandit/

Level 0

ssh bandit0@bandit.labs.overthewire.org -p 2220

For the latest exam PT0-002

https://certification.comptia.org/


Perform memory forensics to find the flags

Memory Forensics — TryHackMe

[Task 2] Login

$ python /opt/tools/volatility/vol.py -f Snapshot6.vmem imageinfo
Volatility Foundation Volatility Framework 2.6.1
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : Win7SP1x64, Win7SP0x64, Win2008R2SP0x64, Win2008R2SP1x64_24000, Win2008R2SP1x64_23418, Win2008R2SP1x64, Win7SP1x64_24000, Win7SP1x64_23418
AS Layer1 : WindowsAMD64PagedMemory (Kernel AS)
AS Layer2 : FileAddressSpace (/tmp/Snapshot6.vmem) …

0xsanz

Software Developer having keen interest in Security, Privacy and Pen-testing. Security+ certified.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store