Running a simple Content discovery with burp, you will find a secret folder with a private ssh key and a corresponding wordlist to crack it. load it to john with 2john and you got its pass. allowing a ssh login with the key as the user, which you’d found in comments on the site. yes … Read moreWriteup GamingServer TryHackMe
When I was 13 years old I was discovering multiplayer games. That was in the end of the 90s and Internet was still very expensive and paid by the minute usually. You gotta dial up your 56k modem and occupy your families phone line. That made internet cafe’s popular and by the time a new … Read moreUO is free to play
The german “Die Drei Fragezeichen” (The three ???, a fictional detective trio from german audio drama for kids, which is popular among adults nowadays) investigated in a floppy disc driven malware attack in the episode 056/Angriff der Computer-Viren (Attack of the computer viruses). Funnily the whole threat model reminds heavily of todays ransomewares. The three … Read moreRansomeware in 1992
On a daily basis and on all hacking oriented communities, people ask how to start or to get into Infosec. I decided to maintain a post where I collect my ressources regarding (beginner) learning ressources. I am learning towards an infosec position for a while now and I am now a junior pentester at a … Read moreThe Big and Dandy "How to get into Infosec" Resources Post 2020
“CVEs mean nothing, for the kernel. Very few CVEs ever get assigned for the kernel. I’m fixing 20 patches a day, I could create a CVE to each one of them, I was told not to because it would burn the world down,” he said. https://www.theregister.co.uk/2019/10/29/intel_disable_hyper_threading_linux_kernel_maintainer/ lol?