If you’re here, It means it’s your start of the journey in Infosec Or May be into CTFs.
So, Our Very famous HackTheBox for CTF Challenge, Itself has a challenge for creating an account.
Well, Spoiler Alert. Don’t blinding copy the steps on this blog but read and understand why you’re doing what you’re doing.
Let’s start with the home page.
By Far the easiest way to flash ROM that I have come across is using SP Flash tool.
Prerequisite for Flashing ROM are as follows:
Step 1: Download and Install SP Flash tool.
SmartPhone FlashTool is working with MediaTek Android smartphones (MTK based)SmartPhone FlashTool is working with MediaTek Android smartphones (MTK based)SmartPhone FlashTool is working with MediaTek Android smartphones (MTK based)
Step 2: Download the Firmware to Flash.
Download the firmware unzip the firmware and browse in the image folder.
There you will find XXXX_scatter.txt file.
File name will end…
Rooting Android device latest method using Magisk Manager:
Disclaimer: Your device might get bricked in the process and the author doesn’t take any responsibility for any losses to the reader.
Step 1: Download the firmware from official website of your mobile corresponding to your device model.
Step 2: Go to folder “image” and copy the “boot.img” file to the “internal Storage” of the device
Step 3: Install latest “Magisk Manager” Application in the phone.
Lame is another easy Box from HackTheBox, based on Linux OS.
This is my third writeup in the series OSCP like Boxes.
This is the manual exploit of a retired box from “HackTheBox”.
Let’s start with our very first step to enumerate open ports using nmap scan.
Hi Friends, Today we’re going to solve the recently retired HackTheBox Machine named “Bastion”.
IP address of “Bastion” is 10.10.10.134.
Now the first step for solving any machine is enumeration.
Well in Enumeration too the very first step to know is what are the ports that are open, what services are running, is there vulnerability already available for that exploit.
Cool, Let’s do a nmap scan for getting the ports info.
command: nmap -sC -sV 10.10.10.134
Security researcher, Blogger, Bug Bounty hunter