June 7, 2024, 4:07 p.m. | Onurcan Genç

System Weakness - Medium systemweakness.com

Greetings everyone,

Today, I will be conducting an in-depth analysis of an older HackTheBox machine known as “Legacy.” The relative ease of compromising this machine allows for a thorough examination of the vulnerabilities present and an exploration of the underlying causes for this security flaw.

1) Reconnaissance

Anyway, lets start with reconnaissance:

Initially, I decided to conduct basic scan against machine because I am dealing a CTF. That’s why, it is not important to make noise on network.

I saw …

capture-the-flag ethical hacking hackthebox penetration testing smb

Information Technology Specialist I: Windows Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, California

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Account Executive - Secureworks Direct Sales - US Remote Philadelphia

@ Dell Technologies | Remote - Pennsylvania, United States

SATCOM Technician - Shariki, Japan - Secret Clearance (Onsite)

@ RTX | RVA99: RTN Remote, Virginia

Senior Test Engineer

@ Commonwealth Bank | Bengaluru - Manyata Tech Park Road

Lead Developer - Pipeline & Algorithms

@ Arctic Wolf | Waterloo