March 31, 2023, 12:39 p.m. | Mr Jokar

System Weakness - Medium systemweakness.com

“Inception” WriteUp | HackThebox | Learn Pivoting with Proxychains

Summary : This machine requires a known software’s LFI exploit that leads to clear text credential to webdav exploit. Then we get a webshell and from leveraging the web proxy we SSH into a machine. But then some more pivoting is required to get into the real machine and get root.

Initial Enumeration

First I will run a port scan with threader3000 a multi threaded port scanner made by the mayor. …

apt chisel cybersecurity hackthebox pivot proxychains writeup

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Threat Analyst

@ Peraton | Morrisville, NC, United States

Kyndryl Offensive Security Professional - Threat-Led Penetration Testing (TLPT) and Red Teaming

@ Kyndryl | Sao Paulo (KBR51645) WeWork Office

Consultant en Cyber Sécurité - Spécialiste PKI H/F

@ Devoteam | Levallois-Perret, France

Cloud Security Architect - Advisor (Remote)

@ Fannie Mae | Reston, VA, United States

OT Cybersecurity Engineer

@ SBM Offshore | Bengaluru, IN, 560071