Feb. 8, 2024, 12:43 p.m. | MEFIRE FILS ASSAN

System Weakness - Medium systemweakness.com

In the following article, I will show you how to take over the machine BountyHunter in Hack The Box. BountyHunter is a good machine to learn about the danger of XML external Entity and use of dangerous function by programmers. In this article, I present the method I follow to pwned this machine

RECONNAISSANCE

We will start by a scan to know about open ports, running services. Nmap is an intuitive tool that help us for this.

nmap -sC -sV …

ctf ctf-writeup hacker hacking hackthebox

Technical Senior Manager, SecOps | Remote US

@ Coalfire | United States

Global Cybersecurity Governance Analyst

@ UL Solutions | United States

Security Engineer II, AWS Offensive Security

@ Amazon.com | US, WA, Virtual Location - Washington

Senior Cyber Threat Intelligence Analyst

@ Sainsbury's | Coventry, West Midlands, United Kingdom

Embedded Global Intelligence and Threat Monitoring Analyst

@ Sibylline Ltd | Austin, Texas, United States

Senior Security Engineer

@ Curai Health | Remote