Exploits to Expertise.

NordbySec

/

Archive

/

Tag: hacking

  • This week’s post is on another cool side project, Hackerbox 113 : “Hardcore“. Hardcore is an intro to 8-bit microcontroller technology using modern variants of the Intel 8051, also known as “The Immortal MCU“. The 8015 is a CISC (Complex Instruction Set Computer) with separate memory spaces for program instructions and data. The goal of this project was to build a usb programmer for microcontrollers, write a simple program to program the blank 8051, and demo some applications of microcontrollers…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • I’ve decided that the Active Directory module from the HackTheBox CPTS pathway is far too long and dense to make a post about, so in lieu of it here’s a writeup on my first pwn’d box on HackTheBox: Active. These are essentially just my notes, but they should get the point across well enough that a n00b could conquer the box without any prior experience. First, we start with an nmap scan to check the active ports on the target:…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • It’s been a while since I detailed some progress on the CPTS, so here’s where we’re at: I’ve just finished the module titled: ‘Pivoting, Tunneling, Port Forwarding‘. It was challenging to learn and internalize a lot of the techniques that were taught so this post is basically my notes from experimenting with pivoting and a short tutorial on how to establish a pivot and double pivot with Ligolo-NG. Note: the skills assessment for the HTB module is what I used…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Greetings! It’s been over a month since my last post, largely due to a couple back to back trips in March and then a couple weeks of hard studying that I didn’t want to break up with a side quest. Anyways, today’s post is about the March Hackerbox, #112 Gamelife. Gamelife is a very interesting project relating to Conway’s Game of Life, a cellular automaton that operates on a 2d square grid. The essential goal of the ‘game’ is to…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶

  • It’s been a few weeks since I’ve posted, but I’m happy to report that I’ve kept working on the CPTS modules and am a few ahead of this post at time of writing, so I’ll be backfilling for a while here with a ton of content that I’ve learned. There was a section after section 3, information gathering, titled ‘Vulnerability Assessment‘. I’ve decided not to dedicate an entire post to the concept as it’s relatively simple and not as applicable…

    ·

    ¶¶¶¶¶

    ¶¶¶¶¶