/images/logo.png

The team is composed of 0xBlank, Pezzz and Steels, check the About us section for more informations. On this website you will find articles about :

  • Our path to pentest/red-team certifications
  • HackTheBox and CTF writeup
  • Presentation of homemade tools
  • Miscellaneous articles

Check out Flop.py Book a central repository of techniques, methodologies, and tools in several categories including Pentest, DFIR, OSINT & more !

Latest articles:

🕵 HTB-Writeup : HORIZONTALL

Recon Rustscan x nmap 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 └─$ rustscan -a 10.10.11.105 -b 5000 -- -A -Pn -sV -T5 .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner.

🕵 HTB-Writeup : SCRIPTKIDDIE

Recon 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 └─$ rustscan -a 10.10.10.226 -b 10000 -- -A -Pn -sV -T5 .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner.

🕵 HTB-Writeup : ARMAGEDDON

Recon nmap x rustscan 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 └─$ rustscan -a 10.10.10.233 -b 10000 -- -A -Pn -sV -T5 .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .

🕵 HTB-Writeup : POISON

Recon nmap x rustscan 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 └─$ rustscan -a 10.10.10.84 -b 10000 -- -A -Pn -sV -T5 .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .

🕵 HTB-Writeup : BUFF

Recon rustscan Rustscan is a usefull port scanning tools developed in Rust. It is not an alternative to nmap but a non-negligible improvement. Rustscan can scan all 65k port fastly then, pipe open port on a nmap scans. This allows to speed up the discovery of open ports and to run nmap scan (with scripts) only on open ports. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 └─$ rustscan -t 2000 -b 20000 -a 10.

🕵 HTB-Writeup : DEVEL

Recon nmap 1 2 3 4 5 6 7 8 9 10 11 12 13 14 PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd | ftp-syst: |_ SYST: Windows_NT | ftp-anon: Anonymous FTP login allowed (FTP code 230) | 03-18-17 02:06AM <DIR> aspnet_client | 03-17-17 05:37PM 689 iisstart.htm |_03-17-17 05:37PM 184946 welcome.png 80/tcp open http Microsoft IIS httpd 7.5 | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/7.5 |_http-title: IIS7 Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Windows machine with Microsoft IIS webserver v7.