|
You are here |
shellsharks.com | ||
| | | | |
securitypimp.net
|
|
| | | | | The challenge given by Remote will have you breaking into the Umbraco CMS system on multiple levels. | |
| | | | |
www.justus.pw
|
|
| | | | | [AI summary] The user successfully gained access to a system by exploiting a Heartbleed vulnerability, decrypted an RSA key using a password obtained from memory, and then used that key to log in as the 'hype' user. After enumerating the system, they accessed a Tmux session to gain root access and retrieved the root flag. | |
| | | | |
zwischenzugs.com
|
|
| | | | | What is nmap? nmapis a network exploration tool and security / port scanner. If you've heard of it, and you're like me, you've most likely used it like this: nmap 127.0.0.1 ie, you've pointed it at an IP address and observed the output: Starting Nmap 7.60 ( https://nmap.org ) at 2018-11-24 18:36 GMT Nmap... | |
| | | | |
yasoob.me
|
|
| | | Hi there fellows. In this post I am going to take you on an adventure with python sockets. They are the real backbones behind web browsing. In simpler terms there is a server and a client. We will deal with the client first. So lets first begin by importing the socket library and making a simple socket. import socket s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) Here we made a socket instance and passed it two parameters. | ||