Pyrat v1.1 — TryHackMe
Tags
attack-pattern: | Data Direct Credentials - T1589.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Ssh - T1021.004 Connection Proxy - T1090 |
Common Information
Type | Value |
---|---|
UUID | f5fdecdd-0891-4310-adb1-8fa9cfc4efcf |
Fingerprint | a2129d19ed0224d7 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Oct. 21, 2024, 10:57 p.m. |
Added to db | Oct. 22, 2024, 2:02 a.m. |
Last updated | Nov. 17, 2024, 4:47 p.m. |
Headline | Pyrat v1.1 — TryHackMe |
Title | Pyrat v1.1 — TryHackMe |
Detected Hints/Tags/Attributes | 31/1/11 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 258 | nmap.org |
|
Details | Domain | 27 | pentestmonkey.net |
|
Details | Domain | 54 | subprocess.call |
|
Details | Domain | 42 | linpeas.sh |
|
Details | File | 224 | rockyou.txt |
|
Details | IPv4 | 1 | 10.10.248.225 |
|
Details | IPv4 | 1 | 10.2.109.19 |
|
Details | IPv4 | 1 | 10.10.33.89 |
|
Details | Url | 132 | https://nmap.org |
|
Details | Url | 14 | https://nmap.org/cgi-bin/submit.cgi?new |
|
Details | Url | 5 | https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet |