The team is composed of 0xBlank, Pezzz and Steels, check the About us section for more informations. On this website you will find articles about :
- Our path to pentest/red-team certifications
- HackTheBox and CTF writeup
- Presentation of homemade tools
- Miscellaneous articles
Latest articles:
Introduction In this article, we’ll explain to you how to write your own plugin to extand and automate the OSINT process.
By following this guide, developer’s plugins will be automatically added to the OPSE core.
This article is part of a three-part series on the OPSE project. In this series of articles we will present different part of the project:
Presentation of the tool w/ installation, usage and an example; A technical presentation of the tool, how it is thinked and coded; A guide to develop your own OPSE plugin !
Introduction In this article, we’ll explain OPSE, a tool that we developed during our school project to automate the OSINT process.
This article is part of a three-part series on the OPSE project. In this series of articles we will present different part of the project:
Presentation of the tool w/ installation, usage and an example; A technical presentation of the tool, how it is thinked and coded; A guide to develop your own OPSE plugin !
Introduction Welcome to our new HackTheBox write-up! In this article, we will guide you through the steps we took to successfully compromise the targeted machine.
Photobomb is an Easy Linux machine.
Recon nmap
1 2 3 4 5 6 7 8 9 10 └─$ rustscan -a 10.10.11.182 -b 2500 -- -T4 -Pn -sV -A PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.
Recon NMAP scan 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack Apache httpd 2.4.41 ((Ubuntu)) |_http-generator: Hugo 0.94.2 | http-methods: |_ Supported Methods: POST OPTIONS HEAD GET |_http-server-header: Apache/2.4.41 (Ubuntu) |_http-title: Ambassador Development Server 3000/tcp open ppp?
Introduction Welcome to our new HackTheBox write-up! In this article, we will guide you through the steps we took to successfully compromise the targeted machine.
UpDown is an Medium Linux machine.
Recon Let’s do some recon !
Nmap
1 2 3 4 5 6 7 8 9 10 11 12 └─$ nmap 10.10.11.177 -T4 -A -Pn -p- PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.
Introduction Welcome to our new HackTheBox write-up! In this article, we will guide you through the steps we took to successfully compromise the targeted machine.
Shoppy is an Easy Linux machine.
Recon 1 2 3 4 5 6 7 8 9 10 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0) | ssh-hostkey: | 3072 9e:5e:83:51:d9:9f:89:ea:47:1a:12:eb:81:f9:22:c0 (RSA) | 256 58:57:ee:eb:06:50:03:7c:84:63:d7:a3:41:5b:1a:d5 (ECDSA) |_ 256 3e:9d:0a:42:90:44:38:60:b3:b6:2c:e9:bd:9a:67:54 (ED25519) 80/tcp open http nginx 1.