HACK THE BOX — PAPER WALKTHROUGH
Tags
attack-pattern: | Exploits - T1587.004 Exploits - T1588.005 Python - T1059.006 Server - T1583.004 Server - T1584.004 Ssh - T1021.004 Sudo - T1169 Default Credentials |
Common Information
Type | Value |
---|---|
UUID | 6616cc99-db0f-4a8a-bd92-e96213e66f4d |
Fingerprint | be809950032647cb |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | March 14, 2023, 5:35 p.m. |
Added to db | March 14, 2023, 7:25 p.m. |
Last updated | Nov. 18, 2024, 8:35 a.m. |
Headline | HACK THE BOX — PAPER WALKTHROUGH |
Title | HACK THE BOX — PAPER WALKTHROUGH |
Detected Hints/Tags/Attributes | 36/1/13 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 168 | ✔ | Infosec on Medium | https://medium.com/feed/tag/infosec | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 7 | cve-2021-3560 |
|
Details | Domain | 2 | 0day.work |
|
Details | Domain | 4129 | github.com |
|
Details | File | 59 | common.txt |
|
Details | File | 255 | user.txt |
|
Details | File | 6 | run.js |
|
Details | File | 2 | id_ras.pub |
|
Details | Github username | 1 | secnigma |
|
Details | IPv4 | 1 | 10.10.11.143 |
|
Details | Url | 1 | http://office.paper |
|
Details | Url | 1 | http://office.paper/fuzz |
|
Details | Url | 1 | https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts |
|
Details | Url | 1 | https://github.com/secnigma/cve-2021-3560-polkit-privilege-esclation |