Feb. 8, 2024, 12:43 p.m. | MEFIRE FILS ASSAN

System Weakness - Medium systemweakness.com

In the following article, I will show you how to take over the machine BountyHunter in Hack The Box. BountyHunter is a good machine to learn about the danger of XML external Entity and use of dangerous function by programmers. In this article, I present the method I follow to pwned this machine

RECONNAISSANCE

We will start by a scan to know about open ports, running services. Nmap is an intuitive tool that help us for this.

nmap -sC -sV …

ctf ctf-writeup hacker hacking hackthebox

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC