Posts

Gaara Vulnhub/Proving grounds CTF Lab walkthrough

Image
Welcome to my blog! 😊 Hello, friends, My name is Ajay I am a cybersecurity analyst. Gaara: The  Gaara   lab contains multiple vulnerabilities that allow attackers to gain unauthorized access to the system and escalate privileges. The lab is designed to be challenging, and users are required to use various tools and techniques to identify and exploit the vulnerabilities. It is important to note that the use of the  Gaara   lab should only be for educational and learning purposes, and not for any malicious activities. It is recommended that users have a basic understanding of networking, Linux, and ethical hacking before attempting to use the lab. In today's lab, we will be utilizing new techniques and methodologies in penetration testing. In this lab, we will be following these steps: Information gathering using nmap. Directory brute-forcing  SSH Password Brute-forcing Using Hydra Privilege escalation by SUID Bit Set on gdb  Step 1:-  Scanning  First, we conducted a port sc

EVILBOX Vulnhub/Proving grounds CTF Lab walkthrough

Image
  Welcome to my blog! 😊 Hello, friends, My name is Ajay I am a cybersecurity analyst. EVILBOX: The EVILBOX  lab contains multiple vulnerabilities that allow attackers to gain unauthorized access to the system and escalate privileges. The lab is designed to be challenging, and users are required to use various tools and techniques to identify and exploit the vulnerabilities. It is important to note that the use of the EVILBOX  lab should only be for educational and learning purposes, and not for any malicious activities. It is recommended that users have a basic understanding of networking, Linux, and ethical hacking before attempting to use the lab. In today's lab, we will be utilizing new techniques and methodologies in penetration testing. In this lab, we will be following these steps: Information gathering using nmap. Directory brute-forcing  . LFI (Local File Inclusion) exploitation using fuff. Obtaining the public key of a user through SSH. Extracting the passphrase fro

HA: Natraj Vulnhub/Proving grounds CTF Lab walkthrough

Image
  Welcome to my blog! 😊 Hello, friends, My name is Ajay I am a cybersecurity analyst. HA: Natraj Nataraj is a dancing avatar of Hindu God Shiva. His dance is called Tandava and it is only performed when he is most angry. Whoever interrupts his dance dies by Shiva while dancing. This is a Boot2Root challenge. Based on Nataraja. You only have to root the machine and find the root flag! All the best! The HA: Natraj lab contains multiple vulnerabilities that allow attackers to gain unauthorized access to the system and escalate privileges. The lab is designed to be challenging, and users are required to use various tools and techniques to identify and exploit the vulnerabilities. It is important to note that the use of the HA: Natraj lab should only be for educational and learning purposes, and not for any malicious activities. It is recommended that users have a basic understanding of networking, Linux, and ethical hacking before attempting to use the lab. In today's HA: Natraj lab,