Open in app

Sign in

Write

Sign in

n00🔑
n00🔑

226 Followers

Home

Lists

About

Oct 22

Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-2

LLMNR and NBT-NS Poisoning LLMNR (Link-Local Multicast Name Resolution) poisoning, also known as NBT-NS (NetBIOS Name Service) poisoning, is a network attack that involves the manipulation or interception of DNS-like name resolution requests within a local network. This attack targets the way Windows devices attempt to resolve hostnames to IP…

Red Team

3 min read

Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-2
Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-2
Red Team

3 min read


Oct 11

Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-1

crackmapexec smb live_hosts

Active Directory

3 min read

Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-1
Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-1
Active Directory

3 min read


Sep 3

Installing and Solving Kubegoat in Kubernetes cluster running on VMs.

Welcome to this blog post on “Installing Kubegoat in a Kubernetes cluster running on VMs.” In this post, we will walk through the steps of installing Kubegoat, a tool designed to simulate real-world Kubernetes cluster misconfigurations and vulnerabilities, in a Kubernetes cluster running on virtual machines. In addition to installing…

Kubernetes

5 min read

Installing and Solving Kubegoat in Kubernetes cluster running on VMs.
Installing and Solving Kubegoat in Kubernetes cluster running on VMs.
Kubernetes

5 min read


Aug 16

Deploying Kubernetes Cluster

While using a managed Kubernetes service like EKS or GKE provides simplicity, understanding how to manually build a Kubernetes cluster from scratch is valuable for really comprehending how Kubernetes works under the hood. …

Kubernetes

10 min read

Deploying Kubernetes Cluster
Deploying Kubernetes Cluster
Kubernetes

10 min read


Jun 27

bigiamchallenge AWS IAM Challenges

Welcome to my blog! In this post, I’ll be sharing my solutions to the challenges presented by bigiamchallenge.com. The Big IAM Challenge is an online CTF (Capture the Flag) event that tests participants’ knowledge of AWS IAM (Identity and Access Management). The challenge consists of six objectives that highlight common…

AWS

7 min read

bigiamchallenge AWS IAM Challenges
bigiamchallenge AWS IAM Challenges
AWS

7 min read


Jun 10

flaws2.cloud (Level 2)

Level 2(http://level2-g9785tw8478k4awxtbox9kk3c5ka8iiz.flaws2.cloud/) a) We start with a web application running inside a container @ http://container.target.flaws2.cloud/ which requires us to authenticate with a username and password which we don’t possess. We have been provided an ecr (Elastic Container Registry) name- level2 b) Listing out images in the registry with our creds…

AWS

3 min read

flaws2.cloud
flaws2.cloud
AWS

3 min read


May 9

flaws2.cloud (Level 1)

Level 1 (http://level1.flaws2.cloud/) — a) We are provided with a form that intakes digits only. Upon checking we came to know that validation is being performed only on the client side using javascript. This can be verified by viewing the HTML source of the page. Method validateForm() is performing this validation. b) We can…

AWS

3 min read

flaws2.cloud (Level 1)
flaws2.cloud (Level 1)
AWS

3 min read


Feb 15

AWSGoat(ine) AWS CTF solution Module 2

Overview/Agenda - Exploiting SQLi for login bypass - Finding and Abusing file upload functionality to upload web shell - Getting a reverse shell using python3 payload and listening using pwncat - Finding DB creds in config file - Finding out that we are in a container - Enumerating container using linpeas - Finding out processes of…

AWS

10 min read

AWSGoat(ine) AWS CTF solution Module 2
AWSGoat(ine) AWS CTF solution Module 2
AWS

10 min read


Jan 31

Creating a pdf merger Web Application using chatgpt AI

Hi readers, recently I was filling up an online form and it was required to merge, upload and submit documents in pdf format. Usually, I tend to use free online tools for merging pdfs(like ilovepdf, etc). But this time the files which I was uploading contained PII and financial information…

Artificial Intelligence

3 min read

Creating a pdf merger Web Application using chatgpt AI
Creating a pdf merger Web Application using chatgpt AI
Artificial Intelligence

3 min read


Jan 8

Persistence ways(The adversary is trying to maintain their foothold)

Gaining continued access to a computer system or network that has been compromised is known as persistence. It requires bypassing security measures and re-configuring systems so that access is maintained even after users log out or reboot the system. This type of access can be difficult to achieve, as the…

Persistence

6 min read

Persistence ways(The adversary is trying to maintain their foothold)
Persistence ways(The adversary is trying to maintain their foothold)
Persistence

6 min read

n00🔑

n00🔑

226 Followers

Computer Security Enthusiast.Definitely not an expert. Usually plays HTB (ID-23862). https://www.youtube.com/@pswalia2u https://www.linkedin.com/in/pswalia2u/

Following
  • Riya Jain

    Riya Jain

  • deetee

    deetee

  • Ozgur Alp

    Ozgur Alp

  • Preet kamal

    Preet kamal

  • Ofir Hamam

    Ofir Hamam

See all (13)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams