March 28, 2024, 5:04 p.m. | Serdar Çatal

System Weakness - Medium systemweakness.com

Difficulty: Medium

As always I started with an nmap scan:

“nmap scan result”

There are two ports, let’s open up the webpage.

It is an default Apache page. So I scanned the url endpoints here is the result:

dirb http://10.10.96.39/

Let’s look at “/console”:

In the source of this page I found an obfuscated java code so I deobfuscated it:

So this is the obfuscated code:

function handleSubmit() {
eval(function (p, a, c, k, e, r) {
e = function …

cybersecurity cybersecurity training red team tryhackme tryhackme-walkthrough

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Staff Firmware Engineer – Networking & Firewall

@ Axiado | Bengaluru, India

Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)

@ SAP | Walldorf, DE, 69190

SAP Security Administrator

@ FARO Technologies | EMEA-Portugal