Jan. 24, 2023, 4:29 p.m. | J0s3phKg

System Weakness - Medium systemweakness.com

The investigation is a CTF-like box. It introduces a couple of interesting vectors. I spent most of the time on enumeration and researching, and it is a great box to learn things you need to become more familiar with.

Key points: #CVE-2022–23935, #Microsoft Message Analysis, #Windows XML EventLog Analysis(EVTX), #Reverse Engineering

Port Scan

Similar to other HTB boxes, as the port scan result shows, we need to get a foothold or credentials through the web portal, and we can …

box hacking hackthebox hackthebox-writeup investigation linux pentesting

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Digital Trust Cyber Transformation Senior

@ KPMG India | Mumbai, Maharashtra, India

Security Consultant, Assessment Services - SOC 2 | Remote US

@ Coalfire | United States

Sr. Systems Security Engineer

@ Effectual | Washington, DC

Cyber Network Engineer

@ SonicWall | Woodbridge, Virginia, United States

Security Architect

@ Nokia | Belgium