TryHackMe's LazyAdmin Room I have tackled this room because it looked interesting. As usual I started the room by clicking on the start machine button and waiting for the machine to come online. Once the machine was online I started to run nmap to give me a
Hacker of the Hill #1 This room has been fun! I have been able to figure out a few questions and I am trying to get more questions but it is now slow going because I am lacking some of the knowledge required. I guess the mantra of "Try
Hack the Box Lame room The initial NMAP scan results had ports for FTP, SSH, SMB and a new one that I didn't know what it was. Port 3632 has a service of distcc and come to find out it is a program to distribute compilation of C or
Work I have recently accepted a new position at work. I have moved from the network side to the security side of IT. I am really excited about the move but this is a major undertaking. I have just started to migrate down the security
Hacker of the Hill #1 Who else is excited for this new room? I am really excited for this new opportunity to learn more and the room will be run alongside Hacker1. For those that don't have a subscription to TryHackMe, I HIGHLY recommend supporting this company by purchasing
RootMe from TryHackMe As always I have to deploy the machine and wait a little bit for the machine to come up. While this is happening I am creating my folder structure for the room and this write up of the room. Once the machine is up
How to use GPG At work today I had a request from a vendor to supply a GPG public key to encrypt some data and I thought I will write an article on how to use GPG. Now that I got a little bit of information about it
TryHackMe's Ignite room As with any room the first thing you do is deploy the server. Make sure that you are connected to the openvpn server or have the attack machine started. Once the machine is deployed I copy the ip address and then paste into the
Busy working I am currently working through the Ignite room in addition to the Throwback room on TryHackMe.com. I only have a limited time to get the Throwback room done and I want to complete that room. I unfortunately won't be posting anything related to
TryHackMe.com room CodCaper In this room you are tasked to get Pingu's fish back. The first thing I do is start the machine. I see that the website shows the default web page for an Apache install. Next I want to do enumeration of the machine. In
Back at it Now that it is a new year I plan on getting back at the learning path for obtaining my OSCP by the end of 2021. I have about two weeks left of access to TryHackMe.com's Throwback room. If you are unfamiliar with that
TryHackMe.com Wonderland box After deploying the server I navigated to the site and I came across this: I then ran nmap to give me a list of ports open. I noticed nothing out of the ordinary. Ports 22 and 80 are open and 58068 is filtered so
First contact Hello and welcome to the first entry in my series of entries about my journey to the OSCP certification. I have been working on TryHackMe.com's Advent of Cyber 2 contest. That has actually been a load of fun to work through and I