March 28, 2024, 5:04 p.m. | Serdar Çatal

System Weakness - Medium systemweakness.com

Difficulty: Medium

As always I started with an nmap scan:

“nmap scan result”

There are two ports, let’s open up the webpage.

It is an default Apache page. So I scanned the url endpoints here is the result:

dirb http://10.10.96.39/

Let’s look at “/console”:

In the source of this page I found an obfuscated java code so I deobfuscated it:

So this is the obfuscated code:

function handleSubmit() {
eval(function (p, a, c, k, e, r) {
e = function …

cybersecurity cybersecurity training red team tryhackme tryhackme-walkthrough

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Compliance Advisor

@ SAP | Budapest, HU, 1031

DevSecOps Engineer

@ Qube Research & Technologies | London

Software Engineer, Security

@ Render | San Francisco, CA or Remote (USA & Canada)

Associate Consultant

@ Control Risks | Frankfurt, Hessen, Germany

Senior Security Engineer

@ Activision Blizzard | Work from Home - CA