<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://elleuchx1.github.io/</id><title>ElleuchX1 | Blog</title><subtitle>Personal Security Blog.</subtitle> <updated>2024-03-06T11:59:20+01:00</updated> <author> <name>ElleuchX1</name> <uri>https://elleuchx1.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://elleuchx1.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://elleuchx1.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.3.3">Jekyll</generator> <rights> © 2024 ElleuchX1 </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>STACK The Flags 2022 Open – Fullpwn</title><link href="https://elleuchx1.github.io/posts/Fullpwn-STF/" rel="alternate" type="text/html" title="STACK The Flags 2022 Open – Fullpwn" /><published>2022-12-05T00:00:00+01:00</published> <updated>2022-12-29T20:06:56+01:00</updated> <id>https://elleuchx1.github.io/posts/Fullpwn-STF/</id> <content src="https://elleuchx1.github.io/posts/Fullpwn-STF/" /> <author> <name>ElleuchX1</name> </author> <category term="CTF" /> <category term="boot2root" /> <summary>Fullpwn Solutions from STACK The Flags CTF</summary> </entry> <entry><title>Crew CTF 2022 – EzChall &amp; EzChall Again</title><link href="https://elleuchx1.github.io/posts/Ezchall-crewctf/" rel="alternate" type="text/html" title="Crew CTF 2022 – EzChall &amp; EzChall Again" /><published>2022-04-17T00:00:00+01:00</published> <updated>2022-12-29T20:06:56+01:00</updated> <id>https://elleuchx1.github.io/posts/Ezchall-crewctf/</id> <content src="https://elleuchx1.github.io/posts/Ezchall-crewctf/" /> <author> <name>ElleuchX1</name> </author> <category term="CTF" /> <category term="Web" /> <summary>Blind SSTI with filters</summary> </entry> <entry><title>HackTheBox - Breadcrumbs Writeup</title><link href="https://elleuchx1.github.io/posts/htb-breadcrumbs/" rel="alternate" type="text/html" title="HackTheBox - Breadcrumbs Writeup" /><published>2021-07-17T00:00:00+01:00</published> <updated>2022-12-29T21:14:19+01:00</updated> <id>https://elleuchx1.github.io/posts/htb-breadcrumbs/</id> <content src="https://elleuchx1.github.io/posts/htb-breadcrumbs/" /> <author> <name>ElleuchX1</name> </author> <category term="HackTheBox" /> <category term="Hard" /> <summary>Here's my writeup for the RETIRED machine Breadcrumbs, Which is an hard Windows machine!</summary> </entry> <entry><title>HackTheBox - Atom Writeup</title><link href="https://elleuchx1.github.io/posts/htb-atom/" rel="alternate" type="text/html" title="HackTheBox - Atom Writeup" /><published>2021-07-10T00:00:00+01:00</published> <updated>2022-12-29T21:37:34+01:00</updated> <id>https://elleuchx1.github.io/posts/htb-atom/</id> <content src="https://elleuchx1.github.io/posts/htb-atom/" /> <author> <name>ElleuchX1</name> </author> <category term="HackTheBox" /> <category term="Medium" /> <summary>Here's my writeup for the RETIRED machine Atom, Which is a Medium Windows machine!</summary> </entry> <entry><title>HackTheBox - Academy Writeup</title><link href="https://elleuchx1.github.io/posts/htb-academy/" rel="alternate" type="text/html" title="HackTheBox - Academy Writeup" /><published>2021-04-25T00:00:00+01:00</published> <updated>2022-12-29T20:36:22+01:00</updated> <id>https://elleuchx1.github.io/posts/htb-academy/</id> <content src="https://elleuchx1.github.io/posts/htb-academy/" /> <author> <name>ElleuchX1</name> </author> <category term="HackTheBox" /> <category term="Easy" /> <summary> Information Gathering Nmap scan sudo nmap -sC -sV -T5 -oA nmap -O -A -v 10.10.10.215 As we see we have 2 ports open SSH on port 22 running OpenSSH 8.2p1 http on port 80 running httpd 2.4.41 we notice as well the academy.htb domain, which we should add to /etc/hosts. Gobuster scan gobuster dir -w /opt/SecLists/Discovery/Web-Content/raft-medium-files.txt -u http://academy.htb -x php ... </summary> </entry> </feed>
