Video Walkthrough: Introduction: This week’s retiring box is DevOops. Coming in at a difficulty rating of 4.3/10, it’s not an incredibly hard machine to root, but it does teach some valuable lessons in web application penetration testing and basic Linux privesc enumeration. Let’s take a look at what a simple “oops” can mean for the
Video Introduction This week’s retired box is Fighter, which brought a lot of pain into my life. Having just started my HTB journey over the past couple of weeks, I have challenged myself to complete the retiring box, at a minimum, so that I can continue to post write-ups. Fighter caused me hours of lost
Video: Introduction: With Sunday’s retirement today, I finally get to write my first Hack The Box write-up. I cannot tell you how exciting that is, but Borat can: Sunday was a bit on the easier side, but in the end, taught me a new tricks I had never seen before. The box reminded me of
By following this guide, I will show you the basics of making an Amazon Web Services (AWS) account, setting up your first EC2 instance, and configuring as well as logging into it via SSH. Then. you will install the GoPhish software and load it to start your first steps towards a successful phishing campaign! Let’s
If you’re a veteran reading this or maybe you’re not a veteran you’re just here trying to figure out how to get into infosec, DIVE IN.
Intro to makefiles, BASH scripts, and making a simple buffer overflow program.
An introduction and learning experience with Vagrant and creating a wargame.
Video Introduction It has been almost a year now since I have passed the OSCP. I wanted to reflect not only on my journey a bit, but also touch on some topics that I feel other reviews rarely go into. For example, the most frequent question I am asked by aspiring red
We at VeteranSec have launched a new video for those hoping to break into cybersecurity. We performed a mock interview with a close friend, Cage Vernon, who is looking to break into cyber as a SOC analyst. Cage had no previous knowledge of the questions that I was going to ask. He was subjected to
In this video, I’ll show you how to perform a man-in-the-middle attack using Responder on a Windows Active Directory environment. Wanna chat? Add me on Twitter or LinkedIn! Veteran? Join our Slack!