-
EXPL0R4BIMUS.PY
Greetings! Today, I will introduce you to my scanning application written in Python called expl0r4bimus.py! You can access my code from here: https://github.com/norcholly/expl0r4bimus PURPOSE OF THE TOOL The distinctive feature of this tool that sets it apart from other scanning tools is that if there is an HTTP service running on port 80 or 8080,…
-
BLUEPRINT
Greetings! Today, we will explore the Blueprint machine on TryHackMe together. SCANNING AND ENUMERATION Firstly, to quickly see which ports are open, we’ll perform a fast nmap scan. INFORMATION GATHERING We see that there are two open web ports. Let’s take a look at port 8080: When we search for osCommerce 2.3.4 on Google, we find…
-
Smag Grotto
Greetings! Today, we will explore the Smag Grotto machine on TryHackMe together. After finding the user flag, we will escalate privileges and find the root flag. ScannIng And ENUMERATION Firstly, to quickly see which ports are open, we’ll perform a fast nmap scan. We didn’t see any unexpected open ports. Let’s perform a directory scan…
-
ascout.sh
Greetings! Today, I will introduce you to my bash script aScout, which you can use extensively while solving CTF challenges and speed up your active reconnaissance process. You can also access the script from here: https://github.com/norcholly/ascout PURPOSE OF THE SCRIPT This bash script minimizes the time we lose by opening separate terminals and typing commands…
Subscribe
If you’d like to receive notifications for upcoming posts, please enter your email address: