all InfoSec news
TryHackMe “BiteMe” Write Up
March 28, 2024, 5:04 p.m. | Serdar Çatal
System Weakness - Medium systemweakness.com
Difficulty: Medium
As always I started with an nmap scan:
“nmap scan result”There are two ports, let’s open up the webpage.
It is an default Apache page. So I scanned the url endpoints here is the result:
dirb http://10.10.96.39/
Let’s look at “/console”:
In the source of this page I found an obfuscated java code so I deobfuscated it:
So this is the obfuscated code:
function handleSubmit() {
eval(function (p, a, c, k, e, r) {
e = function …
cybersecurity cybersecurity training red team tryhackme tryhackme-walkthrough
More from systemweakness.com / System Weakness - Medium
Limit Requests to EC2 Instances to Cloudflare Only IPs
2 days, 15 hours ago |
systemweakness.com
Canary Codes for Curious Minds
2 days, 15 hours ago |
systemweakness.com
Zero Trust Network Access
3 days, 13 hours ago |
systemweakness.com
Detecting Mobile Threats: Indicators of Compromise
3 days, 13 hours ago |
systemweakness.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Associate Compliance Advisor
@ SAP | Budapest, HU, 1031
DevSecOps Engineer
@ Qube Research & Technologies | London
Software Engineer, Security
@ Render | San Francisco, CA or Remote (USA & Canada)
Associate Consultant
@ Control Risks | Frankfurt, Hessen, Germany
Senior Security Engineer
@ Activision Blizzard | Work from Home - CA