all InfoSec news
TryHackMe “Haskhell” Write Up
March 28, 2024, 5:03 p.m. | Serdar Çatal
System Weakness - Medium systemweakness.com
Difficulty: Medium
As always let’s start with a nmap scan:
nmap -sV -sC <VICTIM_IP> -oN <SCAN_OUTPUT>“nmap scan result”
There is a web server on port “5001”. It is running flask. let’s have a look at the webpage:
There is a homework page:
Now I get a homework submit page:
Hmm… It navigates me to nowhere. I think it is time for a directory scan:
Okay, her it is:
It is time to prove my professor that I am a …
cybersecurity flask homework nmap page port red team result running scan server start tryhackme tryhackme-walkthrough web web server
More from systemweakness.com / System Weakness - Medium
Spring Boot Integration Shiro Quick Start Demo
1 day, 15 hours ago |
systemweakness.com
A Deep Dive into Network Security Threats
1 day, 15 hours ago |
systemweakness.com
Defensive Security: Installing PHPIDS on LAMP Servers
1 day, 15 hours ago |
systemweakness.com
TryHackMe Network Services Writeup
1 day, 15 hours ago |
systemweakness.com
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Sr. Staff Firmware Engineer – Networking & Firewall
@ Axiado | Bengaluru, India
Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)
@ SAP | Walldorf, DE, 69190
SAP Security Administrator
@ FARO Technologies | EMEA-Portugal