all InfoSec news
Machine 2: Gaara Walkthrough
Feb. 28, 2024, 11:50 a.m. | Indranil
System Weakness - Medium systemweakness.com
Gaara CTF Walkthrough
Gaara | Level: Easy | Linux
Gaara walkthroughMachine URL: https://portal.offsec.com/labs/play
Machine IP — http://192.168.216.142
Steps to Solve the machine:-
- Use nmap to enumerate the target
2. Try to open the web server in the browser since port 80 is open
gaara3. Brute force the ssh credentials using hydra assuming the username is gaara.
hydraCredentials: user-gaara ; pass- iloveyou2
4. SSH into the machine using the obtained credentials …
More from systemweakness.com / System Weakness - Medium
Clocky | TryHackMe Write-up
1 day, 20 hours ago |
systemweakness.com
Tuesday Morning Threat Report: Apr 30, 2024
1 day, 20 hours ago |
systemweakness.com
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
SITEC- Systems Security Administrator- Camp HM Smith
@ Peraton | Camp H.M. Smith, HI, United States
Cyberspace Intelligence Analyst
@ Peraton | Fort Meade, MD, United States
General Manager, Cybersecurity, Google Public Sector
@ Google | Virginia, USA; United States
Cyber Security Advisor
@ H&M Group | Stockholm, Sweden
Engineering Team Manager – Security Controls
@ H&M Group | Stockholm, Sweden