Initial Analysis of an ARM Cortex Firmware of a Device️

Introduction The firmware is the embedded software that controls the basic functioning of electronic devices, from routers and IP cameras to smart home appliances and industrial systems. Unlike traditional software, firmware operates directly on hardware, making it a critical target in terms of security, functionality, and privacy. Firmware analysis involves examining this embedded software to understand its internal workings, detect potential vulnerabilities, identify backdoors, and in some cases modify or extract relevant information. This type of analysis is particularly relevant in security audits, forensic investigations, reverse engineering, or exploit development. ...

June 1, 2025 · 5 min

Hack The Box: EscapeTwo

Description EscapeTwo is an easy Hack The Box machine that features: Initial access using an assumed breach scenario that leads in a discovery of a SMB share SMB share with damaged spreadsheet reveal DB Administrator credentials DB Administrator is able to run commands and read a file with credentials Credential’s user have WriteOwner permission over Certification Authority account Certification Authority account password can be changed Privilege Escalation via a vulnerability in a certification template Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.241.157. ...

May 24, 2025 · 13 min

Hack The Box: Heal

Description Heal is a medium Hack The Box machine that features: Path Traversal in a Ruby on Rails web application Database Dump of a Ruby on Rails web Application Weak password found in database dump allows the login to LimeSurvey application Remote Command Execution using LimeSurvey application and the upload of a malicious plugin User Pivoting by using a reused password from a configuration file of LimeSurvey Privilege Escalation by abusing a weak instance of Consul that allows the execution of commands Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.30.209. ...

May 17, 2025 · 8 min

Hack The Box: UnderPass

Description UnderPass is an easy Hack The Box machine that features: SNMP Enumeration to find an installed web application Use of default credentials in the RADIUS management web application User and Password Enumeration of the RADIUS web application Password Reuse of RADIUS user in Linux server Privilege Escalation via Mosh (Mobile Shell) command executed with root permissions Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.145.216. ...

May 10, 2025 · 6 min

Description of the encryption in Digital Mobile Radio Networks (DMR)️

Introduction️ DMR (Digital Mobile Radio) is a digital radio standard developed by the ETSI (European Telecommunications Standards Institute), designed to replace analog radio systems and offer more efficient communications. It operates in TDMA (Time Division Multiple Access) with two time slots within a 12.5 kHz channel, allowing for simultaneous transmissions on the same frequency. It allows additional services beyond voice transmission, such as data sending, like text messages or location reports of terminals. Around voice, it allows both individual calls similar to mobile phone calls and group calls, where registered terminals can participate.️ ...

May 1, 2025 · 5 min

Hack The Box: Administrator

Description Administrator is an medium Hack The Box machine that features: Active Directory Enumeration using given user domain credentials Given user domain with GenericAll access grant to an user, allowing the user to change the password User domain with ForceChangePassword access grant to an user, allowing the user to change the password User can access to a FTP server that allows the recovery of a password manager backup Recovery of the master password of a password manager and its credentials User domain with GenericWrite access grant to an user, allowing the user to recover the Kerberos hash and the password Privilege Escalation with an user domain with the DCSync permissions, dumping the credentials Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.144.56. ...

April 19, 2025 · 9 min

Hack The Box: LinkVortex

Description LinkVortex is an easy Hack The Box machine that features: Subdomain Enumeration to find a hidden Git Repository Credential Leakage in a Git Repository Arbitrary File Read in Ghost CMS Password Reuse in Linux account found in Ghost configuration file Privilege Escalation via bypassing the restriction of a Bash script Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.39.160. ...

April 12, 2025 · 9 min

GSM Telephony (2G) - IV - Analysis of traffic from a base station️

Introduction️ With the deployment of a virtual base station virtual and a mobile device with OsmocomBB software, it is now possible to analyze traffic generated when making a phone call or sending text messages using Wireshark.️ Starting the Wireshark tool.️ We start a new session of Wireshark, monitoring by -f UDP packets with the filter -Y gsmtap on the interface -i lo.️ wireshark -k -f udp -Y gsmtap -i lo Start of the virtual base station.️ We are starting the virtual base station.️ ...

April 1, 2025 · 7 min

Hack The Box: Alert

Description Alert is an easy Hack The Box machine that features: PHP web application vulnerable to Cross-Site Scripting (XSS) PHP web application vulnerable to Server-Side Request Forgery (SSRF) PHP web application vulnerable to Path Traversal that leaks the credentials of a web server Web server credentials of a web server reused for the Linux system Privilege Escalation via a writable web server folder hosted with a service by root user Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.121.113. ...

March 22, 2025 · 10 min

Hack The Box: Certified

Description Certified is an medium Hack The Box machine that features: Active Directory Enumeration using given user domain credentials Given user domain with WriteOwner access grant to a group, allowing the user to add itself to the group Group users has the GenericWrite access grant to a domain user with permissions to log into the machine, allowing changing the password Logged user has the GenericAll permission to a Certificate Authority user, allowing them to change its password and other user fields Privilege Escalation via impersonating the Administrator user using the ESC9 vulnerability in Certificate Templates used in Active Directory Certificate Services Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.129.24.237. ...

March 15, 2025 · 12 min