HackPark - TryHackMe (OSCP STYLE)
This is a write-up for the HackPark machine on the TryHackme platform. We tackled this pentesting exercise using the approach and methodology of OSCP. We’ll be using the JuicyPotato tool to get access as admin user
This is a write-up for the HackPark machine on the TryHackme platform. We tackled this pentesting exercise using the approach and methodology of OSCP. We’ll be using the JuicyPotato tool to get access as admin user
On TryHackMe, the challenge of the Game ZOne Machine is to be solved either through SQLiMap or manually. This machine runs on Linux operating system. For this particular challenge, the manual approach will be followed to solve it, you’ll see my method to find manual SQLi and retrive all the data from the victim’s database
During the process of resolving Alfred, I faced several challenges, such as identifying default credentials and using tools like Juicy Potato. To overcome these obstacles, I employed a methodology based on the OSCP.
In this machine, we put ourselves in a real-world scenario where we are asked to perform a black-box penetration test on a system to uncover its vulnerabilities. There are no hints, and we only know that automated tools are not an option for us.
On TryHackMe, the challenge of the Steel Mountain Machine is to be solved either through Metasploit or manually. This machine runs on Windows operating system. For this particular challenge, the manual approach will be followed to solve it.