Hack The Box Starting Point: Dancing Walkthrough
Walkthrough of the Dancing machine from HTB Starting Point Tier 0. Learn SMB enumeration, network share access, and the risks of unsecured file sharing.
40 posts from this period
Walkthrough of the Dancing machine from HTB Starting Point Tier 0. Learn SMB enumeration, network share access, and the risks of unsecured file sharing.
Walkthrough of the Fawn machine from HTB Starting Point Tier 0. Learn FTP enumeration, anonymous access, and the risks of unencrypted file transfer protocols.
Walkthrough of the Meow machine from HTB Starting Point Tier 0. Learn basic enumeration, port scanning, and the risks of legacy protocols like telnet.
Walkthrough of the Redeemer machine from HTB Starting Point Tier 0. Learn Redis database enumeration, NoSQL database interaction, and the risks of exposed databases.
Announcing a new educational series covering Hack The Box Starting Point machines. Starting with Tier 0 free boxes, we'll walk through real penetration testing scenarios step-by-step.
Learn SSH connection fundamentals with OverTheWire Bandit Level 0. Step-by-step guide to connecting securely, managing passwords efficiently, and essential terminal tips for beginners.
OverTheWire Bandit Level 1 walkthrough. Learn basic Linux file operations: listing files with ls, reading files with cat, and finding your first password.
OverTheWire Bandit Level 10 walkthrough. Learn how to use the strings command to extract human-readable text from binary files and filter results with grep to find specific patterns.
OverTheWire Bandit Level 11 walkthrough. Learn how to decode base64 encoded data using the base64 command, understand encoding vs. decoding, and extract passwords from encoded strings.
OverTheWire Bandit Level 12 walkthrough. Learn how to decode ROT13 encoded data using rot13 or tr commands, understand Caesar ciphers, and extract passwords from rotated text.
OverTheWire Bandit Level 13 walkthrough. Learn how to reverse hex dumps with xxd, decompress multiple compression formats (gzip, bzip2, tar), and iteratively extract passwords from nested compressed files.
OverTheWire Bandit Level 14 walkthrough. Learn how to use SSH private keys for authentication, understand key-based authentication vs. passwords, and connect to localhost using SSH keys.
OverTheWire Bandit Level 15 walkthrough. Learn how to use netcat to connect to network services, submit passwords to ports, and automate password submission using pipes.
OverTheWire Bandit Level 16 walkthrough. Learn how to use OpenSSL s_client to connect to SSL/TLS encrypted services, submit passwords over encrypted connections, and handle SSL certificate information.
OverTheWire Bandit Level 17 walkthrough. Learn how to use nmap for port scanning, identify SSL services, and retrieve SSH keys from network services.
OverTheWire Bandit Level 18 walkthrough. Learn how to use the diff command to compare files and find the only line that changed between two password files.
OverTheWire Bandit Level 19 walkthrough. Learn how to run commands via SSH without getting an interactive shell, bypassing .bashrc modifications that log you out.
OverTheWire Bandit Level 2 walkthrough. Learn how to handle files with dashes in their names, understand Linux command-line arguments, and use relative paths to access tricky filenames.
OverTheWire Bandit Level 20 walkthrough. Learn about setuid binaries, how they work, and how to use them for privilege escalation. Essential concept for Linux security.
OverTheWire Bandit Level 21 walkthrough. Learn about network programming, localhost connections, using netcat as a listener, and how setuid binaries can interact with network services.
OverTheWire Bandit Level 22 walkthrough. Learn about cron jobs, scheduled tasks, reading cron configurations, and how automated processes can be exploited for privilege escalation.
OverTheWire Bandit Level 23 walkthrough. Learn about cron job exploitation, variable substitution, MD5 hashing, and how to analyze and manipulate shell scripts for privilege escalation.
OverTheWire Bandit Level 24 walkthrough. Learn to create your first shell script exploit, understand cron job execution, file permissions, and how to get automated processes to run your code.
OverTheWire Bandit Level 25 walkthrough. Learn about brute-forcing, network service exploitation, looping in bash, and how to automate password attacks against network services.
OverTheWire Bandit Level 26 walkthrough. Learn about restricted shells, non-standard shells, Vim editor exploitation, and how to break out of restricted environments using creative techniques.
OverTheWire Bandit Level 27 walkthrough. Learn to use your escaped shell from Level 26, work with setuid binaries, and continue building on shell escape techniques.
OverTheWire Bandit Level 28 walkthrough. Learn about Git repositories, cloning over SSH, understanding repository structure, and how version control systems can expose sensitive information.
OverTheWire Bandit Level 29 walkthrough. Learn about Git commit history, viewing changes in commits, and how secrets in old commits can still be accessed even after being removed.
OverTheWire Bandit Level 3 walkthrough. Learn how to handle files with spaces in their names using quotes, tab completion, and escape characters.
OverTheWire Bandit Level 30 walkthrough. Learn about Git branches, checking out branches, and how secrets might be stored in non-production branches even when removed from the main branch.
OverTheWire Bandit Level 31 walkthrough. Learn about Git refs, packed-refs files, and how Git stores references to commits that might contain secrets not visible in normal git log output.
OverTheWire Bandit Level 32 walkthrough. Learn about Git push operations, .gitignore files, and how to bypass .gitignore restrictions to push files to a remote repository.
OverTheWire Bandit Level 33 walkthrough. Learn about positional parameters, escaping restricted shells, and using $0 to bypass uppercase shell restrictions.
OverTheWire Bandit Level 4 walkthrough. Learn how to find and read hidden files in Linux using ls -a, navigate directories, and understand how hidden files work.
OverTheWire Bandit Level 5 walkthrough. Learn how to identify human-readable files using the file command, handle files with dashes in their names, and distinguish between text and binary files.
OverTheWire Bandit Level 6 walkthrough. Learn how to use the find command with advanced criteria like file size and permissions to locate specific files efficiently.
OverTheWire Bandit Level 7 walkthrough. Learn how to use the find command to locate files by ownership (user and group), understand file permissions, and search efficiently in Linux.
OverTheWire Bandit Level 8 walkthrough. Learn how to use grep to search for specific text within files, understand piping, and efficiently find information in large files.
OverTheWire Bandit Level 9 walkthrough. Learn how to find unique lines in a file using sort and uniq commands, understand piping, and efficiently process text data in Linux.
Announcing a new educational series covering OverTheWire wargames. Starting with Bandit, then Natas, and beyond. Real walkthroughs, real learning, zero shortcuts.