Dec. 30, 2023, 12:12 p.m. | AbhirupKonwar

System Weakness - Medium systemweakness.com

Proving Grounds : Sumo Walkthrough

Welcome to my 3rd PG machine “Sumo”.Linux based easy level box.

PORT SCANNING

PORT 80 ENUMERATION

Robots.txt file not found.Use wappalyzer for tech stack detection.

NIKTO VULNERABILITY SCANNING

Target is vulnerable to shellshock. CVE-2014–6271

About the vulnerability:

Bash allowed users to define functions within environment variables. This capability meant that an environment variable could include not only simple data but also shell functions that Bash would execute when processing that variable.Bash did not properly validate …

ctf ethical hacking oscp oscp-preparation pentest

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden