Hack the Box — Archetype
Common Information
Type Value
UUID cfb8868a-7728-4ef6-9607-1fb8c7f27570
Fingerprint 978c995125870bc7
Analysis status DONE
Considered CTI value -2
Text language
Published Jan. 12, 2023, 7:52 p.m.
Added to db Jan. 12, 2023, 9:14 p.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline Hack the Box — Archetype
Title Hack the Box — Archetype
Detected Hints/Tags/Attributes 37/1/24
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 167 Cybersecurity on Medium https://medium.com/feed/tag/cybersecurity 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 14
app.hackthebox.com
Details Domain 10
mssqlclient.py
Details Domain 1
pentestwiki.org
Details Domain 4128
github.com
Details Domain 37
psexec.py
Details File 10
mssqlclient.py
Details File 33
nc.exe
Details File 1208
powershell.exe
Details File 1
c:\\users\public\\nc.exe
Details File 2126
cmd.exe
Details File 255
user.txt
Details File 34
psexec.py
Details File 2
winpeasx64.exe
Details File 16
consolehost_history.txt
Details Github username 1
int0x33
Details Github username 8
carlospolop
Details IPv4 1
10.10.10.27
Details IPv4 619
0.0.0.0
Details IPv4 1
10.129.102.63
Details Url 1
https://app.hackthebox.com/starting-point
Details Url 1
https://pentestwiki.org/academy/how-to-get-a-xp_cmdshell-reverse-shell
Details Url 1
https://github.com/int0x33/nc.exe/blob/master/nc.exe
Details Url 9
http://0.0.0.0:8000
Details Url 1
https://github.com/carlospolop/peass-ng/releases/download/refs/pull/260/merge/winpeasx64.exe