all InfoSec news
TryHackMe “BiteMe” Write Up
March 28, 2024, 5:04 p.m. | Serdar Çatal
System Weakness - Medium systemweakness.com
Difficulty: Medium
As always I started with an nmap scan:
“nmap scan result”There are two ports, let’s open up the webpage.
It is an default Apache page. So I scanned the url endpoints here is the result:
dirb http://10.10.96.39/
Let’s look at “/console”:
In the source of this page I found an obfuscated java code so I deobfuscated it:
So this is the obfuscated code:
function handleSubmit() {
eval(function (p, a, c, k, e, r) {
e = function …
cybersecurity cybersecurity training red team tryhackme tryhackme-walkthrough
More from systemweakness.com / System Weakness - Medium
Spring Boot Integration Shiro Quick Start Demo
1 day, 16 hours ago |
systemweakness.com
A Deep Dive into Network Security Threats
1 day, 16 hours ago |
systemweakness.com
Defensive Security: Installing PHPIDS on LAMP Servers
1 day, 16 hours ago |
systemweakness.com
TryHackMe Network Services Writeup
1 day, 16 hours ago |
systemweakness.com
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Sr. Staff Firmware Engineer – Networking & Firewall
@ Axiado | Bengaluru, India
Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)
@ SAP | Walldorf, DE, 69190
SAP Security Administrator
@ FARO Technologies | EMEA-Portugal