130n@calvinlai.com
Ctrlk
  • About Calvin Lai (fkclai)
  • My Work
  • Cyber Security
    • Cyber Security Centre (CSC)
  • Detection and Response
  • Application Architecture
    • Student Module Registration Flow Series using Microservices & Event-Driven Architecture
    • Comparison of MVC , N-tier and Microservice Architecture
  • AI: Using RAG-Based Enquiry Assistant using Vector Database
  • Application Security
    • Securing React Native Applications with Java Microservices
    • Securing WebView-Based Mobile Applications with Java Microservices
    • OAuth, SAML, and OpenID Connect: Key Differences and Use Cases
    • Secure Coding Principles
    • HTTP Header Security Principles
    • Mitigating Broken Object Level Authorization (BOLA)
    • Spring Boot Validation
    • Output Encoding in JavaServer Faces (JSF)
    • Session Management Security Issues
    • Common API Security Problems
    • JAVA Exception Handling
    • File Upload Validation
    • OAuth 2.0 Security
    • Microservice Security
    • Modifying and Protecting Java Class Files
    • JAVA Program
  • Exploit/CVE PoC
    • ZeroLogon Exploit
    • Remote Retrieved Chrome saved Encrypted Password
    • Twitter Control an RCE attack
  • Hacking Report (HTB)
    • Hits & Summary
    • Windows Machine
    • Linux Machine
      • Photobomb 10.10.11.182
      • Pandora 10.10.11.136
      • BountyHunter 10.10.11.100
      • CAP 10.10.10.245
      • Spectra 10.10.10.229
      • Ready 10.10.10.220
      • Doctor 10.10.10.209
      • Bucket 10.10.10.212
      • Blunder 10.10.10.191
      • Registry 10.10.10.159
      • Magic
      • Tabby
  • Penetration Testing
    • Web Application PenTest
    • Network/System PenTest
    • Mobile Penetration Test
  • Threat Intelligence
    • Advanced Persistent Threat (APT) groups
  • Red Team (Windows)
    • 01 Reconnaissance
    • 02 Privileges Escalation
    • 03 Lateral Movement
    • 04 AD Attacks
    • 05 Bypass-Evasion
    • 06 Kerberos Attack
    • 99 Basic Command
  • Exploitation Guide
    • 01 Reconnaissance
    • 02 Port Enumeration
    • 03 Web Enumeration
    • 04 Windows Enum & Exploit
    • 05 File Enumeration
    • 06 Reverse Shell Cheat Sheet
    • 07 SQL Injection
    • 08 BruteForce
    • 09 XSS Bypass Checklist
    • 10 Spring Boot
    • 11 WPA
    • 12 Payload list
  • Vuln Hub (Writeup)
    • MrRobot
    • CYBERRY
    • MATRIX 1
    • Node-1
    • DPwwn-1
    • DC7
    • AiWeb-2
    • AiWeb-1
    • BrainPan
  • CTF (Writeup & Tips)
    • CTF Tools & Tips
    • Hacker One
    • CTF Learn
    • P.W.N. University - CTF 2018
    • HITCON
    • Pwnable
  • Useful Command/Tools
    • Kali
    • Windows
    • Linux
  • Offensive Security Lab & Exam
    • Lab
    • Tools for an Offensive Certification
  • ISO 27001
    • Disclaimer
    • What is ISO 27001
    • Documentation
    • Common Mistake
    • Q&A
    • ISO 27001 Controls and Domains
  • Risk Management
Powered by GitBook
On this page

Was this helpful?

  1. Hacking Report (HTB)

Linux Machine

Photobomb 10.10.11.182Pandora 10.10.11.136BountyHunter 10.10.11.100CAP 10.10.10.245Spectra 10.10.10.229Ready 10.10.10.220Doctor 10.10.10.209Bucket 10.10.10.212Blunder 10.10.10.191Registry 10.10.10.159MagicTabby
PreviousCascadeNextPhotobomb 10.10.11.182

Last updated 5 years ago

Was this helpful?