Open in app

Sign In

Write

Sign In

rootissh
rootissh

144 Followers

Home

About

Published in rootissh

·Mar 8

HackTheBox | Buff Walkthrough | HTB

We are starting a daily series in which we are going to cover writeups of 37 Hack The Box boxes of the TJNull list for OSCP preparation. 37 Days of Hack The Box with rootissh #Day3 By Atharva Shirude General Information Name :- Buff Difficulty :- Easy OS :- Windows IP :- 10.10.10.198…

Hackthebox

4 min read

HackTheBox | Buff Walkthrough | HTB
HackTheBox | Buff Walkthrough | HTB
Hackthebox

4 min read


Published in rootissh

·Mar 2

HackTheBox | Valentine Walkthrough | HTB

30 Days of HackTheBox with rootissh #Day2 We are starting a daily series in which we are going to cover writeups of 37 Hack The Box boxes of the TJNull list for OSCP preparation. By Atharva Shirude General Information Name :- Valentines Difficulty :- Easy OS :- Linux IP :- 10.10.10.79 Contents Scanning Enumeration Exploitation Privilege…

Oscp

5 min read

HackTheBox | Valentine Walkthrough | HTB
HackTheBox | Valentine Walkthrough | HTB
Oscp

5 min read


Published in rootissh

·Mar 1

HackTheBox | Friendzone Walkthrough | HTB

We are starting a daily series in which we are going to cover writeups of 37 Hack The Box boxes of the TJNull list for OSCP preparation. 37 Days of Hack The Box with rootissh #Day1 By Atharva Shirude General Information Name :- Friendzone Difficulty :- Easy OS :- Linux IP …

Hackthebox

5 min read

HackTheBox | Friendzone Walkthrough | HTB
HackTheBox | Friendzone Walkthrough | HTB
Hackthebox

5 min read


Published in rootissh

·Jan 24

Google Dorking: What is it and How to do it?

by Prateek Kuber and Atharva Shirude — Google is the World’s most used search engine on the internet today. Everyone uses this browser for their day-to-day searches. From their school projects to looking for cat videos to watch while they work! But, the google browser is a very strong tool if you know how it uses it…

Learn

3 min read

Google Dorking: What is it and How to do it?
Google Dorking: What is it and How to do it?
Learn

3 min read


Published in rootissh

·Jan 24

What is Android Application Penetration Testing?

Android Application Penetration Testing is the process of testing the security of an Android application by simulating an attack. The goal of this testing is to identify vulnerabilities in the application that could be exploited by an attacker to gain unauthorized access to sensitive information or perform malicious actions. There…

Hacking

2 min read

What is Android Application Penetration Testing?
What is Android Application Penetration Testing?
Hacking

2 min read


Published in rootissh

·Jan 2

Why do WordPress themes always have some vulnerabilities?

Author - Prabhjot Kaur WordPress- WordPress is that the most well-liked CMS on the web, but, consequently, it’s additionally the foremost hacked. As an example, in 2018, 90% of hacked CMS-powered websites were hosted by WordPress, amounting to around ninety,000 attacks per minute. If you employ WordPress, this information could cause…

WordPress

6 min read

Why do WordPress themes always have some vulnerabilities?
Why do WordPress themes always have some vulnerabilities?
WordPress

6 min read


Published in rootissh

·Dec 11, 2022

TryHackMe Advent of Cyber 4→ DAY 8— Last Christmas I gave you my ETH

After it was discovered that Best Festival Company was now on the blockchain and attempting to mint their cryptocurrency, they were quickly compromised. Best Festival Company lost all its currency in the exchange because of the attack. It is up to you as a red team operator to discover how the attacker exploited the contract and attempt to recreate the attack against the same target contract. — Objectives of DAY-8

Advent Of Cyber 4

3 min read

TryHackMe Advent of Cyber 4→ DAY 8— Last Christmas I gave you my ETH
TryHackMe Advent of Cyber 4→ DAY 8— Last Christmas I gave you my ETH
Advent Of Cyber 4

3 min read


Published in rootissh

·Dec 8, 2022

TryHackMe Advent of Cyber 4→ DAY 7— Maldocs roasting on an open fire

McSkidy accidentally opened the document, and it's still unknown what this document did in the background. McSkidy has called on the in-house expert Forensic McBlue to examine the malicious document and find the domains it redirects to. Malicious documents may contain a suspicious command to get executed when opened, an embedded malware as a dropper (malware installer component), or may have some C2 domains to connect to.

Advent Of Cyber 4

4 min read

TryHackMe Advent of Cyber 4→ DAY 7— Maldocs roasting on an open fire
TryHackMe Advent of Cyber 4→ DAY 7— Maldocs roasting on an open fire
Advent Of Cyber 4

4 min read


Published in rootissh

·Dec 6, 2022

TryHackMe Advent of Cyber 4→ DAY 6— It’s beginning to look a lot like phishing

Elf McBlue found an email activity while analysing the log files. It looks like everything started with an email… — Objectives of DAY-6 Learn what email analysis is and why it still matters. Learn the email header sections. Learn the essential questions to ask in email analysis. Learn how to use email header sections to evaluate an email. Learn to use additional tools to discover email attachments and conduct further analysis.

Advent Of Cyber 4

4 min read

TryHackMe Advent of Cyber 4→ DAY 6— It’s beginning to look a lot like phishing
TryHackMe Advent of Cyber 4→ DAY 6— It’s beginning to look a lot like phishing
Advent Of Cyber 4

4 min read


Published in rootissh

·Dec 5, 2022

TryHackMe Advent of Cyber 4→ DAY 5—He knows when you’re awake

Elf McSkidy asked Elf Recon McRed to search for any backdoor that the Bandit Yeti APT might have installed. If any such backdoor is found, we would learn that the bad guys might be using it to access systems on Santa’s network. — Objectives of DAY -5 Learn about common remote access services. Recognize a listening VNC port in a port scan. Use a tool to find the VNC server’s password. Connect to the VNC server using a VNC client.

Advent Of Cyber 4

4 min read

TryHackMe Advent of Cyber 4→ DAY 5—He knows when you’re awake
TryHackMe Advent of Cyber 4→ DAY 5—He knows when you’re awake
Advent Of Cyber 4

4 min read

rootissh

rootissh

144 Followers

Rooting the world one day at a time.

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech