THREE– Starting Point – Hack The Box // Walkthrough // Kali Linux

THREE– Starting Point – Hack The Box // Walkthrough // Kali Linux Hey Purple Team, Dan here! Today we dive into the “Three” box, a part of the Hack The Box’s Starting Point series using our Kali Linux. 🛡️ NMAP TUTORIAL 👉   by Boris


0 Comments2 Minutes

Responder – Hack The Box // Walkthrough & Solution // Kali Linux

Responder – Hack The Box // Walkthrough & Solution // Kali Linux Responder is a free box available at the entry level of HackTheBox. Using Kali Linux, we introduce users to NTLM, enhancing their understanding of Local File Inclusion (LFI). NTLM, or Windows New Technology LAN…


0 Comments1 Minutes

Crocodile – Hack The Box // Walkthrough & Solution // Kali Linux

Crocodile – Hack The Box // Walkthrough & Solution // Kali Linux In this box, and using Kali Linux, the target computer has a weak access control vulnerability that allowed active user credentials to be harvested through FTP. The same credentials might be used to access a restricted…


0 Comments2 Minutes

Sequel – Hack The Box // Walkthrough & Solution // Kali Linux

Sequel – Hack The Box // Walkthrough & Solution // Kali Linux In the last video, we got a little experience with SQL injections using Kali Linux. We learnt how a web application may use a database of some kind to authenticate users and how it might be abused if not set correctly. In…


0 Comments1 Minute

Appointment – Hack The Box // Walkthrough & Solution // Kali Linux

Appointment – Hack The Box // Walkthrough & Solution // Kali Linux This box allows us to try conducting a SQL injection against a web application with a SQL database using Kali Linux. SQL Injection is a typical method of hacking web sites that collect and store user input data using…


0 Comments1 Minutes

Synced – Hack The Box // Walkthrough & Solution // Kali Linux

Synced – Hack The Box // Walkthrough & Solution // Kali Linux Today I’m coming back to squash the Starting Point, Tier 0, with Synced! Starting Point is for learning the basics of pen-testing and cyber security using Kali Linux. And what better way to do it than by discovering…


0 Comments1 Minutes

Mongod – Hack The Box // Walkthrough & Solution // Kali Linux

Mongod – Hack The Box // Walkthrough & Solution // Kali Linux Using Kali Linux, HTB’s Mongod box was a tricky one! Hack the Box throws a curve ball by adding the Mongo switch pretty() at the end of the submission string. Since I’m not a Mongo expert, it took me a while…


0 Comments1 Minute

Preignition – Hack The Box // Walkthrough & Solution // Kali Linux

Preignition – Hack The Box // Walkthrough & Solution // Kali Linux Using Kali Linux, Preignition from the Hack the Box (HTB) Starting Point series is all about dirbusting a web address on port 80/tcp (HTTP) to find a hidden admin page. This box is part of Tier 0 and catalogued as…


0 Comments1 Minute

Explosion – Hack The Box // Walkthrough & Solution // Kali Linux

Explosion – Hack The Box // Walkthrough & Solution // Kali Linux Today, using Kali Linux, we’ll continue our Hack the Box (HTB) Marathon series with box number #5, “Explosion.” This challenge is considered “very easy” and it’s part of the Stating…


0 Comments1 Minute

Redeemer – Hack The Box // Walkthrough & Solution // Kali Linux

Redeemer – Hack The Box // Walkthrough & Solution // Kali Linux Hello Everyone!!! Using Kali Linux, I’ll explain how to solve the “Redeemer” machine, which is part of the “Starting Point” labs and has a “Very Easy” difficulty rating. The…


0 Comments1 Minute