Explore >> Select a destination


You are here

pentestmonkey.net
| | blog.ikuamike.io
0.9 parsecs away

Travel
| | Summary Over the weekend I participated in Metasploit Community December CTF by Rapid7 with team fr334aks . We ended up getting position 57/413. The CTF was meant to be beginner-friendly. Intro Teams are provided with their own instance of a kali box which is public facing to act as a jump host to reach an ubuntu VM which hosts the challenges. On the ubuntu VM there are 20 open ports for each challenge.
| | 0xcybery.github.io
1.4 parsecs away

Travel
| | Demonstration of how you can insert a file at the right location, you can use it to hijack Python execution.
| | gtfobins.github.io
0.6 parsecs away

Travel
| | [AI summary] The content provides Perl scripts and commands for creating reverse shells and exploiting SUID and sudo privileges to gain system access.
| | cocomelonc.github.io
16.4 parsecs away

Travel
|