There are many posts on this and they all have different solutions none of which I wanted to do because of the extent of packages that needed to be removed and reinstalled. Most
A quick look at how we can exfiltrate data using the Linux ping command. This technique can transfer the output of Linux commands over the network to a target system using ICMP packets and the stock ping command.
So after making my video for my "Can You Hack It" series on the system Smasher from hack the box I realized that there is a lot of room to dig deeper and
An example of a simple scaffolding for creating python pickle payloads to abuse applications which allow control over input. This technique will allow you to write standard Python code for getting RCE and package it to auto-execute when loaded by the pickle module.
Three months into hackthebox.eu and still loving it. I decided to post a quick story on my experiences thus far for others that are interested in learning about computer security.