HacktheBox MonitorsTwo Makinesi Çözümü
Tags
attack-pattern: | Data Python - T1059.006 Server - T1583.004 Server - T1584.004 Ssh - T1021.004 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | 4cbc3768-4ebf-4611-9a57-c77330e652f1 |
Fingerprint | 2a036b5fb1bb4f1d |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | May 22, 2023, 4 p.m. |
Added to db | May 22, 2023, 6:25 p.m. |
Last updated | Nov. 16, 2024, 9:02 p.m. |
Headline | HacktheBox MonitorsTwo Makinesi Çözümü |
Title | HacktheBox MonitorsTwo Makinesi Çözümü |
Detected Hints/Tags/Attributes | 18/1/13 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 30 | cve-2022-46169 |
|
Details | Domain | 9 | www.sonarsource.com |
|
Details | Domain | 14 | entrypoint.sh |
|
Details | Domain | 2 | exp.sh |
|
Details | File | 1 | başlıyorum.tar |
|
Details | File | 1 | remote-agent.php |
|
Details | File | 3 | cacti.sql |
|
Details | File | 52 | hash.txt |
|
Details | File | 255 | user.txt |
|
Details | File | 205 | root.txt |
|
Details | IPv4 | 3 | 10.10.16.19 |
|
Details | IPv4 | 1 | 10.10.11.211 |
|
Details | Url | 1 | https://www.sonarsource.com/blog/cacti-unauthenticated-remote-code-execution |