Vulnhub – Nagini Walkthrough – writeup – Harry Potter

In the first machine of the Harry Potter series, Aragog, we found out two of the eight Horcruxes. Nagini is the second machine of the series with medium difficulty. However, I found it pretty difficult nonetheless. Let’s begin our journey to find Nagini, the vicious snake. I won’t be explaining all of the steps which … Read more

Vulnhub – Aragog Walkthrough – Writeup – Harry Potter

aragog

Harry Potter is one of the greatest movie and book series for no doubt. On the other hand, the VulnHub series by Mansoor R is one of the best challenges I have done. We can say that the hacking series is based on the original series where we have to identify horcruxes placed by Voldemort … Read more

Hacking Kioptrix Level 2 (#1.1) – Part 3 – Shell access

In the previous post, we bypassed the login using SQL injection. Now, we want to exploit the feature of the application to open a reverse shell. This can be done in other ways as well. Here, I will be listen on port 4444 in my attacker machine (192.168.19.132, since I have installed newer version of … Read more

Hacking Kioptrix Level 2 (#1.1) – Part 2 – SQL Injection

In the previous post, we tried to identify the possible vulnerabilities of the target machine. In this post, we will be trying to exploit the system. Up to now, we have visited the IP address of the target machine in firefox which gave us two input fields. Now, if we try some random username and … Read more

Hacking Kioptrix Level 2 (#1.1) – Part 1 – Scanning

We completed the first level of the Kioptrix challenge. Now, we have got to enter the next level of it. So, the link of the Kioptrix Level 2 is https://www.vulnhub.com/entry/kioptrix-level-11-2,23/. We will find an updated version of Kioptrix Level 2 from the link. For the installation and basic troubleshooting please refer to the previous posts. … Read more

Hacking Kioptrix Level 1 (#1) – Part 4 – Exploit

In the previous post, we entered the target machine exploiting a vulnerability in mod_ssl. However, we want to find some other vulnerabilities as well. In this post, we are using the Metasploit framework to find the vulnerability and exploit. Also, I will be using the root user to run my commands. Starting the Metasploit framework … Read more

Hacking Kioptrix Level 1 (#1) – Part 3 – Exploit

In the previous post, we performed some scans using Nmap and noted down the results. Now, in this post, I will make use of other ways with the help of existing information. Therefore, let’s try to hit the webserver of the target by opening the IP address of the target 192.168.19.129 in firefox. We saw … Read more

Hacking Kioptrix Level 1 (#1) – Part 1 – Setting up

Introduction This blog post is intended for tech enthusiasts who want to learn how to hack. When I first started, I was rather confused. Therefore, I am trying to explain each and every step through this blog post. However, there are some prerequisites that you must be aware of. Please look at my blog post … Read more