all InfoSec news
TryHackMe “Haskhell” Write Up
March 28, 2024, 5:03 p.m. | Serdar Çatal
System Weakness - Medium systemweakness.com
Difficulty: Medium
As always let’s start with a nmap scan:
nmap -sV -sC <VICTIM_IP> -oN <SCAN_OUTPUT>“nmap scan result”
There is a web server on port “5001”. It is running flask. let’s have a look at the webpage:
There is a homework page:
Now I get a homework submit page:
Hmm… It navigates me to nowhere. I think it is time for a directory scan:
Okay, her it is:
It is time to prove my professor that I am a …
cybersecurity flask homework nmap page port red team result running scan server start tryhackme tryhackme-walkthrough web web server
More from systemweakness.com / System Weakness - Medium
Limit Requests to EC2 Instances to Cloudflare Only IPs
2 days, 11 hours ago |
systemweakness.com
Canary Codes for Curious Minds
2 days, 11 hours ago |
systemweakness.com
Detecting Mobile Threats: Indicators of Compromise
3 days, 8 hours ago |
systemweakness.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Salesforce Solution Consultant
@ BeyondTrust | Remote United States
Divisional Deputy City Solicitor, Public Safety Compliance Counsel - Compliance and Legislation Unit
@ City of Philadelphia | Philadelphia, PA, United States
Security Engineer, IT IAM, EIS
@ Micron Technology | Hyderabad - Skyview, India
Security Analyst
@ Northwestern Memorial Healthcare | Chicago, IL, United States
Werkstudent Cybersecurity (m/w/d)
@ Brose Group | Bamberg, DE, 96052