Fast learner’s guide to Vegeta on Proving Grounds
This was fun but there’s a funky rabbit hole involving a QR code image that I’ll include just because it’s interesting and a good academic process 1. Scan to find…
Welcome to MadUnix.com
This was fun but there’s a funky rabbit hole involving a QR code image that I’ll include just because it’s interesting and a good academic process 1. Scan to find…
I was interested in how ChatGPT on openai.com works so I created an account and had it write a few articles. It’s actually really interesting and I can see how…
Hey, here’s a fast learner’s guide to conquering DriftingBlues6 on Proving Grounds. Proving Grounds is a fun place to hang out and hack boxes for credit and experience. This particular…
This is the best general purpose weapon build I’ve discovered on war zone. (CoD) Super lethal but I added tube to my M4+60 round mag for lethality level Mega. That…
Hey, Here’s a quick summarization of the virtual target called Shakabrah on Proving Grounds. If you’re new, apply for an account, get the openvpn pack, run it with #openvpn universal.ovpn…
Some really useful NSE – Nmap Scripting Engine scripts. Keyword search (ctrl+F) to find items related to what you need like smb, nse or even geolocation with IP Addresses and…
There’s an obvious pattern to hacking boxes I’m seeing on Proving Grounds and OffSec lab systems: 1. Scan for open ports, services. Find them. If TCP/80-443 is open, try an…
Impatient Person's walkthrough of Vulnhub / Offensive Computing's Loly Machine (Intermediate difficulty)
Howdy, For the impatient, here’s a quick summary of breaking into the Vulnhub box “Geisha” sudo nmap -p- 1.2.3.4 The password ‘letmein‘ is revealed (no quotes). SSH into the
1. nmap to find only tcp/22 and 80 open. 2. Robots.txt has a base64-encoded string that decodes to a url string. It’s a password. 3. Find the username in the…