When we talk about hardware hacking — we have physical device as attack surface, we have embedded devices to pentest on, One may try to start pentesting that piece of hardware by enumeration some useful information with the help of few tools will be listed below.

By opening the casing…

Reverse engineering is the process of understanding the particular aspects of the program, which are listed below to identify the components of the system and the interrelationship between the components. And enhance the components of the system and improve the performance and scalability of the system (or) subsystem. Software reverse…

Chatterbox is a Medium level Windows BufferOverflow machine on hack the box and a part of Tj null’s playlist for OSCP prep.This is a buffer overflow machine in which we run our exploit on the Achat service.We also abuse permissions using icacls to read the root flag.I …

Following is the link to join our New Discord Server-(GEEK REBORN)

MAKE SURE YOU READ ALL RULES & INSTRUCTIONS BELOW…

RULES & INSTRUCTIONS !

  • Make sure To Read & Follow All the Rules Very Carefully !!!
  • IN CASE ANY RULE IS BROKEN, WE WILL REMOVE & BAN THE MEMBER IMMEDIATELY.

ABOUT THE DISCORD SERVER-

In Geek Reborn we…

Jeeves is a Medium rated Hack The Box machine and is rated as more challenging than oscp.Here we exploit Jenkins using a groovy reverse shell and privilege escalate using Juicy Potato.

ENUMERATION

Nmap scan shows us that port 80,135,445 and 50000 are open

ZeusCybersec

I am a Penetration Tester, Currently pursuing OSCP. Skilled in Network Pen-testing and Developing Hacking Tools using Python.I Share my Knowledge on YouTube

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store