-
This week I took a break from HackTheBox to work on a hardware project that I got a few weeks ago. During the holiday, I subscribed to a monthly subscription box service called ‘Hackerboxes‘, catchy right? Anyways, HB subscription includes a monthly hardware project that requires soldering together components onto some cool custom PCB’s and then installing and modifying some files/programs to get them to do cool things. This month’s box is called ‘Relay‘, and the overall goal was to…
¶¶¶¶¶
ai / arduino / cybersecurity / electronics / hackerbox / hacking / hardware / hardwarehacking / IoT / security / technology¶¶¶¶¶
¶¶¶¶¶
-
Jumping right into it this week: This module really wasn’t too difficult, although I did run into some trouble with the skills assessment. To quickly summarize, this module covered some surface level web hacking techniques, namely enumeration and digging through hidden directories to establish a viable target list. Below is a rough outline and what I learned from each section: Skills assessment | lessons learned The skills assessment here should have been simple, but just as the previous ones I…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
I clearly misspoke a few posts ago, as two days of study time is not 24 hours of study time, but rather 48 hours of study time, as is evidenced by the time it took me to complete this module. This was an extremely comprehensive section regarding manually footprinting common services and the labs were particularly challenging. I don’t want to get DMCA’d by HTB, so I won’t list any specifics or walkthroughs from the module but rather some things…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
I’m still in the process of working through the footprinting module, which was estimated to take two days of study. This obviously breaks down to 24 hours of study time which can be a lot on top of all the other day to day things that life spawns. It’s also like twenty some lessons that compose near entirely of text walls followed by short labs. So this post is a short one about a side quest that I’ve taken up…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Diving right into it, I finished the ‘Network Enumeration with Nmap‘ section over the weekend and am dragging my feet on the ‘Footprinting’ module this week so I decided to write a short post about the Nmap module and how it is shaping my enumeration methodology. For those who don’t know, NMAP is a free and open source network mapping utility for network discovery and security auditing. It is capable of many things, primarily host and port enumeration, which is…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


