Enterprise Writeup TL;DR This Writeup is about Enterprise, on hack the box. It was a Linux box. It starts off with a SQLInjection for an initial foothold. We dump a database find passwords login to WordPress and get a shell. There we find we are in a docker network. So we port forward a host and […]
Exploit Education Phoenix | Practical Stack Exploitation
Stack Exploitation like a pro. Stack Exploitation seems pretty intense although it’s easy. In this post, we’ll solve all the stack challenges there are 6 stack exploitation challenges in Pheonix CTF. This is a series of stack exploitation challenges. Starting from Stack zero which is a memory overwriting challenge advances by each level. If you […]
Exploit Education Phoenix | Practical Binary Exploitation
This is a practical guide on a number of binary exploitation techniques, if you are a binary exploitation noob then this is the guide for you. ever wanted to learn about reverse engineering but didn’t because it was too hard? there was a lot of advanced material but not much for noobs. Say no more […]