Jan. 24, 2023, 4:29 p.m. | J0s3phKg

System Weakness - Medium systemweakness.com

The investigation is a CTF-like box. It introduces a couple of interesting vectors. I spent most of the time on enumeration and researching, and it is a great box to learn things you need to become more familiar with.

Key points: #CVE-2022–23935, #Microsoft Message Analysis, #Windows XML EventLog Analysis(EVTX), #Reverse Engineering

Port Scan

Similar to other HTB boxes, as the port scan result shows, we need to get a foothold or credentials through the web portal, and we can …

box hacking hackthebox hackthebox-writeup investigation linux pentesting

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)