Open in app

Sign In

Write

Sign In

Dhanishtha Awasthi
Dhanishtha Awasthi

74 Followers

Home

About

Feb 23, 2022

SAML — What to check for?

SAML Validation and Pen testing. This guide introduces the minimum requirements during validation and pen test of SAML implemented in your application. TL;DR Nowadays one of the most common ways of authentication is SAML (Security Assertion Markup Language). This is one of the ways in which we can implement Single Sign On into our applications. There…

Saml

6 min read

Saml

6 min read


Mar 23, 2021

Microsoft Exchange Server — Attack 2021

The biggest attack blew 2021 in the start, where Microsoft Exchange Server was attacked by Hafnium — A Chinese group of hackers. The big buzz was created when almost all the important organizations including homeland security to Health Care organizations to 500 Fortune Companies, became victim of the attack. …

Exchange Server Attack

4 min read

Microsoft Exchange Server — Attack 2021
Microsoft Exchange Server — Attack 2021
Exchange Server Attack

4 min read


Mar 23, 2021

Solarwinds — Attack December 2020

Devastating attack on Solarwinds in 2020, resulted into largest breaches that occurred. When I asked people, they knew only the fact, that attack was a supply chain attack, which had exploit incorporated in updates. Let’s dig deeper and know few more things. TERMINOLOGY Let’s go through some terminology before we end…

Solarwinds Hack

3 min read

Solarwinds — Attack December 2020
Solarwinds — Attack December 2020
Solarwinds Hack

3 min read


Mar 13, 2021

Feline — HTB walkthrough

Today we will be coming across machine Feline. This machine is interesting as it has java de serialization in JSESSION id parameter. Without wasting time let’s jump in. ENUMERATION Nmap Scan for Service Versions with Default Scripts.

Feline Htb Walkthorugh

7 min read

Feline — HTB walkthrough
Feline — HTB walkthrough
Feline Htb Walkthorugh

7 min read


Feb 7, 2021

My TryHarder — OSCP Journey.

Veni Vidi Vici. After the endless efforts throughout the year, I finally achieved my Offensive Security Certified Professional certification on 5th FEB 2021. Though everyone shares the experience and their journey, but I will definitely love to add mine to the bibliotheca. …

Offensive Security

7 min read

My TryHarder — OSCP Journey.
My TryHarder — OSCP Journey.
Offensive Security

7 min read


Jan 16, 2021

SneakyMailer — HTB Walktrough

What ?? Another part of Sneaky HTB box ??? Might be. But was fun to solve it. Real life phishing attack practice. User part was definitely a level up. Let’s start. ENUMERATION Full port nmap scan for TCP ports reveals following

Sneakymailer Htb

7 min read

SneakyMailer — HTB Walktrough
SneakyMailer — HTB Walktrough
Sneakymailer Htb

7 min read


Jan 16, 2021

Tabby — HTB Walkthrough

Recently retired machine, fits under OSCP like machines list. Quite similar to another HTB machine Jerry. Better exploitation in privilege escalation part. ENUMERATION Nmap scan with default scripts for version scan leads us to following open ports.

Tabby Htb Walkthrough

4 min read

Tabby — HTB Walkthrough
Tabby — HTB Walkthrough
Tabby Htb Walkthrough

4 min read


Jan 11, 2021

Unbalanced — HTB Walkthrough

Well, totally a hard machine, required a lots of nudges and help. Also it took some scripting and XPATH injection and hell of a ride. Without wasting time let’s start. ENUMERATION Nmap scan for unbalanced using default scripts and service versions we see.

Unbalanced Htb

11 min read

Unbalanced — HTB Walkthrough
Unbalanced — HTB Walkthrough
Unbalanced Htb

11 min read


Jan 11, 2021

OpenKeyS — HTB walkthrough

Medium level hack the box challenge, based on OpenBSD vulnerabilities for SSH keys. ENUMERATION Running nmap scan for default scripts and service version we see port 80 and port 22 open.

Openkeys Htb Walkthrough

4 min read

OpenKeyS — HTB walkthrough
OpenKeyS — HTB walkthrough
Openkeys Htb Walkthrough

4 min read


Jan 8, 2021

TryHackme! — OSCP Buffer Overflow

Going through the OSCP prep journey, it has now a days in trend, to solve out Buffer Overflow from TryHackMe! platform. Today I am going to share one of them, so that we may get an insight of basic steps by which easiest level stack buffer overflow can be exploited…

Tryhackme

5 min read

TryHackme! — OSCP Buffer Overflow
TryHackme! — OSCP Buffer Overflow
Tryhackme

5 min read

Dhanishtha Awasthi

Dhanishtha Awasthi

74 Followers

OSCP | CEH | Cyber Security Enthusiast.

Following
  • Chenny Ren

    Chenny Ren

  • Luke Stephens (@hakluke)

    Luke Stephens (@hakluke)

  • Elliot Alderson

    Elliot Alderson

  • BhavKaran

    BhavKaran

  • Vishwaprabhakar Singh

    Vishwaprabhakar Singh

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech