-
This week’s post is on another cool side project, Hackerbox 113 : “Hardcore“. Hardcore is an intro to 8-bit microcontroller technology using modern variants of the Intel 8051, also known as “The Immortal MCU“. The 8015 is a CISC (Complex Instruction Set Computer) with separate memory spaces for program instructions and data. The goal of this project was to build a usb programmer for microcontrollers, write a simple program to program the blank 8051, and demo some applications of microcontrollers…
¶¶¶¶¶
cybersecurity / electronics / hacking / hardwarehacking / Nordbysec / programming / security / technology¶¶¶¶¶
¶¶¶¶¶
-
I’ve decided that the Active Directory module from the HackTheBox CPTS pathway is far too long and dense to make a post about, so in lieu of it here’s a writeup on my first pwn’d box on HackTheBox: Active. These are essentially just my notes, but they should get the point across well enough that a n00b could conquer the box without any prior experience. First, we start with an nmap scan to check the active ports on the target:…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
It’s been a while since I detailed some progress on the CPTS, so here’s where we’re at: I’ve just finished the module titled: ‘Pivoting, Tunneling, Port Forwarding‘. It was challenging to learn and internalize a lot of the techniques that were taught so this post is basically my notes from experimenting with pivoting and a short tutorial on how to establish a pivot and double pivot with Ligolo-NG. Note: the skills assessment for the HTB module is what I used…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Greetings! It’s been over a month since my last post, largely due to a couple back to back trips in March and then a couple weeks of hard studying that I didn’t want to break up with a side quest. Anyways, today’s post is about the March Hackerbox, #112 Gamelife. Gamelife is a very interesting project relating to Conway’s Game of Life, a cellular automaton that operates on a 2d square grid. The essential goal of the ‘game’ is to…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
It’s been a few weeks since I’ve posted, but I’m happy to report that I’ve kept working on the CPTS modules and am a few ahead of this post at time of writing, so I’ll be backfilling for a while here with a ton of content that I’ve learned. There was a section after section 3, information gathering, titled ‘Vulnerability Assessment‘. I’ve decided not to dedicate an entire post to the concept as it’s relatively simple and not as applicable…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


