Explore >> Select a destination


You are here

parsiya.net
| | taeluralexis.com
4.5 parsecs away

Travel
| | In this writeup, we'll exploit a Linux machine on Hack The Box with CVE-2023-46604, leveraging Java deserialization for remote code execution.
| | pentestlab.blog
2.4 parsecs away

Travel
| | 1 post published by Administrator on March 9, 2017
| | balintmagyar.com
4.7 parsecs away

Travel
| | Fixed in version 16.3.0.0407 - $8,500 bug bounty. Another code execution bug following my November 2024 find.
| | 0xdf.gitlab.io
25.0 parsecs away

Travel
| Active was an example of an easy box that still provided a lot of opportunity to learn. The box was centered around common vulnerabilities associated with Active Directory. There's a good chance to practice SMB enumeration. It also gives the opportunity to use Kerberoasting against a Windows Domain, which, if you're not a pentester, you may not have had the chance to do before.