Script Kiddie : Hack The Box Walk Through

  1. Enumeration
  2. Malicious payload (template bin)
  3. Reverse Shell
  4. Privilege escalation

--

--

--

Just an another security nerd… CEH MASTER | PENTESTER

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Synchronous vs. Asynchronous Replication Strategy

The challenges of making a true Offline First app

Cloud OnBoard with Google

EDA and basic Data Visualizations in R (and Python)

Java 8 | String Method 2

Server Side Swift & Concurrency: two sides of the same coin

Binary Search: Control Shrinking/Result Direction

Encoding Breakdown for Beginners

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Vikas Sharma

Vikas Sharma

Just an another security nerd… CEH MASTER | PENTESTER

More from Medium

Pickle Rick Ctf Writeup

OverTheWire:~$ Bandit Level 11 → 12

Understanding the Active Directory easiest way 1.0

TryHackMe: Introductory Networking Task 5–8