Open in app

Sign In

Write

Sign In

A-s4t0sh
A-s4t0sh

3 Followers

Home

About

May 6, 2021

HarryPotter: Aragog

Description Back to the Top Aragog is the 1st VM of 3-box HarryPotter VM series in which you need to find 2 horcruxes hidden inside the machine (total 8 horcruxes hidden across 3 VMs of the HarryPotter Series) and ultimately defeat Voldemort. This is the part 1 out of 3 VMs…

Harry Potter

6 min read

HarryPotter: Aragog
HarryPotter: Aragog
Harry Potter

6 min read


Apr 18, 2021

My Communication Server :1

As the description of the machine on Vulnhub given by the author tells us to change the MAC address of the Adapter to let the machine take IP. Before proceeding forward lets have a look at the description of the machine So starting with the changes to be made :

Walkthrough

7 min read

my communication server 1
my communication server 1
Walkthrough

7 min read


Mar 23, 2021

Pumpkin Series :

1. Pumpkin Garden. 2. Pumpkin Raising. 3. Pumpkin Festival. Starting with the first level of the series that is Pumpkin Garden. As usual starting with netdiscover tool to get the IP of the machine so without wasting my time I jumped into terminal and entered the command . # netdiscover…

Vulnhub

5 min read

Pumpkin Series :
Pumpkin Series :
Vulnhub

5 min read


Dec 20, 2020

Reven Security

Desciption: Raven is a Beginner/Intermediate boot2root machine. There are four flags to find and two intended ways of getting root. Built with VMware and tested on Virtual Box. Set up to use NAT networking. As the description tells about the machine , a boot2root machine made for a beginner or…

Vulnhub

6 min read

Reven Security
Reven Security
Vulnhub

6 min read


Mar 22, 2020

TBBT: Fun with flags Walkthrough

TBBT: Funwithflags _____ _ _ _ _ _ _____ _ |…

10 min read

TBBT: Fun with flags Walkthrough
TBBT: Fun with flags Walkthrough

10 min read


Feb 23, 2020

DC-1 (Walkthrough)

Lets start with scanning the network to get the IP of the machine using “netdiscover”. ┌─[✗]─[root@NITRO]─[~] └──╼ #netdiscover -i vboxnet1 As the machine got the IP that is 192.168.57.3, using the IP I started port scanning using “nmap”. ┌─[✗]─[root@NITRO]─[~] └──╼ #nmap -v -sT -A -p- 192.168.57.3 PORT…

4 min read

DC-1 (Walkthrough)
DC-1 (Walkthrough)

4 min read


Feb 23, 2020

DC-2 ( Walkthrough )

Starting with enumeration in order to get the IP of the machine using “netdiscover” scan. netdiscover -i vboxnet1 Here I got the IP of the machine that is 192.168.57.106 so now I proceed with the IP to scan the services running on the machine using “nmap” scan. nmap -v -sT…

Ctf Writeup

5 min read

DC-2   ( Walkthrough )
DC-2   ( Walkthrough )
Ctf Writeup

5 min read

A-s4t0sh

A-s4t0sh

3 Followers
Following
  • MachineX

    MachineX

  • Rahul

    Rahul

  • Kanchan Chakrawarty

    Kanchan Chakrawarty

  • Sachin Verma

    Sachin Verma

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech