We have determined that this website has a command injection...
Read MoreRemember, try to solve the box on your own first — you can use Google or other resources. If after all that you still can’t solve it, then read the write-up and follow along.
THM [Easy Lab] – Creative
Exploit a vulnerable web application and some misconfigurations to gain...
Read MoreTHM [Easy Lab] – Hacker vs. Hacker
Someone has compromised this server already! Can you get in...
Read MoreTHM [Easy Lab] – The Sticker Shop
Can you exploit the sticker shop in order to capture...
Read MoreTHM [Easy Lab] – TakeOver
This challenge revolves around subdomain enumeration.
Read MoreCPTS #09: Attacking Common Applications
Using metasploit for quick exploit and Exploit-DB is a good...
Read MoreCPTS #08: Active Directory Enumeration & Attacks
In Skill #1, we were provided with a web shell...
Read MoreCPTS #07: Pivoting, Tunneling, and Port Forwarding
Metasploit could really help make this pivot easier to manage.
Read MoreCPTS #06: Attacking Common Services
Be careful — make sure to use -p- in your...
Read MoreCPTS #05: Password Attacks
CPTS #05: Password Attack Remember to create a custom password...
Read More