Skip to content
BOOK_GHANIM

BOOK_GHANIM

  • ProgrammingExpand
    • C#
    • Python
  • CyberSecExpand
    • Articles
    • HandbooksExpand
      • Active Directory – Notes, Methodology, Cheatsheet
      • AV Evasion 101: Essential Techniques and Concepts
      • Buffer Overflow – Notes and cheatsheet
      • Command And Control – C2 Framework
      • OSEP Checklist
      • Pivoting and port forwarding guide
      • THM – Windows Privilege Escalation – Part 16
      • THM – Linux Privilege Escalation – Part 15
      • THM – Common Linux Privilege Escalation – Part 20
      • THM – NMAP Documentation and Commands – Part 13
      • THM – What the Shell – Part 19
    • Notes
    • Write-ups
  • GuidesExpand
    • HomeLab
    • Homelab Cheatsheet
  • HandbooksExpand
    • Handbook I ? Basic
    • Handbook II ? Advanced
    • Handbook III ? Cloud
    • Handbook IV ? RedTeam
    • Handbook V ? Maldev
  • Methodology
  • Toolbox
  • About
  • Search
BOOK_GHANIM
BOOK_GHANIM
  • THM – What the Shell – Part 19
    Notes

    THM – What the Shell – Part 19

    Byaghanim September 29, 2021September 5, 2022

    This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. What is a shell? A shell is what we use when interfacing with a Command Line environment (CLI). Common bash or sh programs…

    Read More THM – What the Shell – Part 19Continue

  • THM – Active Directory Basics – Part 18
    Notes

    THM – Active Directory Basics – Part 18

    Byaghanim September 29, 2021January 25, 2022

    This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. Introduction Active Directory is the directory service for Windows Domain Networks. What is Active Directory? It’s a collection of machine and servers connected…

    Read More THM – Active Directory Basics – Part 18Continue

  • THM – Windows Exploitation Basics – Part 17
    Notes

    THM – Windows Exploitation Basics – Part 17

    Byaghanim September 29, 2021January 25, 2022

    This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. Windows file system and permissions explained What is the file system? It Is the method and data structure that an operating system uses…

    Read More THM – Windows Exploitation Basics – Part 17Continue

  • THM – Encryption – Part 16
    Notes

    THM – Encryption – Part 16

    Byaghanim September 26, 2021January 25, 2022

    This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. Key Terms Ciphertext – The result of encrypting a plaintext, encrypted data Cipher – A method of encrypting or decrypting data. Modern ciphers…

    Read More THM – Encryption – Part 16Continue

  • THM – John The Ripper – Part 15
    Notes

    THM – John The Ripper – Part 15

    Byaghanim September 26, 2021January 25, 2022

    This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. Cracking Basic Hashes John Basic Syntax Basic Syntax for John the Ripper commands: john – invokes the John the ripper program [path to…

    Read More THM – John The Ripper – Part 15Continue

  • THM – Hashing – Part 14
    Notes

    THM – Hashing – Part 14

    Byaghanim September 26, 2021January 25, 2022

    This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. Key Terms Plaintext – Data before encryption or hashing, often text but not always as it could be a photograph or other file…

    Read More THM – Hashing – Part 14Continue

  • THM – Upload Vulnerabilities – Part 13
    Notes

    THM – Upload Vulnerabilities – Part 13

    Byaghanim September 26, 2021March 24, 2022

    This is a continued series where I document my path through different tryhackme courses. I recommend everyone that wants to learn cyber security to subscribe to tryhackme.com and take the courses there. Introduction Badly handled file uploads can lead to Remote Code Execution (RCE) if an attacker manages to upload and execute a shell. Will…

    Read More THM – Upload Vulnerabilities – Part 13Continue

  • Previse CTF – HTB
    Writeups

    Previse CTF – HTB

    Byaghanim September 7, 2021January 25, 2022

    So this CTF is categorized as easy, but I would actually say that getting foothold was pretty hard. Once inside, its pretty straight forward enumeration and lateral movement if you’ve done enough information gathering. Anyway, as always I like to start with an nmap scan to see what we’re working with. # Nmap 7.92 scan…

    Read More Previse CTF – HTBContinue

  • Attacktive Directory CTF [Walkthrough] -THM
    Writeups

    Attacktive Directory CTF [Walkthrough] -THM

    Byaghanim August 6, 2021January 25, 2022

    https://www.tryhackme.com/room/attacktivedirectory This CTF is more “guided and less challenge based”. Its one of the more interesting Windows rooms I’ve tried on THM. Enumeration We start with NMAP scan. # Nmap 7.60 scan initiated Fri Aug 6 12:08:59 2021 as: nmap -sC -sV -oN nmap.result 10.10.195.136 Nmap scan report for ip-10-10-195-136.eu-west-1.compute.internal (10.10.195.136) Host is up (0.00046s…

    Read More Attacktive Directory CTF [Walkthrough] -THMContinue

  • Mr Robot CTF – THM
    Writeups

    Mr Robot CTF – THM

    Byaghanim August 6, 2021January 25, 2022

    https://www.tryhackme.com/room/mrrobot This is an interesting CTF where the objective is to find 3 keys. As always we start with the enumeration stage. Enumeration There are 2 ports open and 1 closed. We’ll take a look at the webserver. Interesting website. The commands show us videos and pictures, but nothing that can help us find the…

    Read More Mr Robot CTF – THMContinue

  • CAP CTF – HTB
    Writeups

    CAP CTF – HTB

    Byaghanim June 29, 2021January 25, 2022

    This is an interesting CTF where, based on the name of this machine, I’ll have to analyze a pcap file and try to get some information out of it. So as always, I start with the enumeration stage. Enumeration From the NMAP scan I see that port 21, 22 and 80 are open. Lets check…

    Read More CAP CTF – HTBContinue

  • ArcheType CTF – HTB
    Writeups

    ArcheType CTF – HTB

    Byaghanim June 17, 2021January 25, 2022

    Enumeration In the enumeration stage I start off by doing an NMAP scan. There are a couple of interesting ports open, among other things port 445 (SMB) and 1433 (mssql). I’ll run ‘enum4linux’ against the server. The interesting take from that scan was that it dosent require username or password to connect to SMB. We’ll…

    Read More ArcheType CTF – HTBContinue

  • Backup files to the cloud using Rclone – Windows
    HomeLab

    Backup files to the cloud using Rclone – Windows

    Byaghanim June 11, 2021January 25, 2022

    Rclone is an amazing tool that is used to manage files on cloud storage. Its fast, easy to use and command line based. You can choose from a wide range of supported providers, such as Amazon Drive, Google Drive, OneDrive, JottaCloud and many more. See the complete list here. https://rclone.org/ In this blogpost I will…

    Read More Backup files to the cloud using Rclone – WindowsContinue

  • Pickle Rick CTF – Writeup
    Writeups

    Pickle Rick CTF – Writeup

    Byaghanim May 22, 2021January 25, 2022

    This is a CTF on TryHackMe website. The task is that you will have to help Pickle Rick find 3 ingredients so he can turn himself back into a human. When you deploy the machine you are presented with a website. Enumeration stage The first thing I like to do is look at the source…

    Read More Pickle Rick CTF – WriteupContinue

  • THM – OWASP Top 10 – Part 12
    Notes

    THM – OWASP Top 10 – Part 12

    Byaghanim May 22, 2021January 25, 2022

    Intro  OWASP top 10   Injection  Broken Authentication  Sensitive Data Exposure  XML External Entity  Broken Access Control  Security Misconfiguration  Cross-site Scripting  Insecure Deserialization  Components with Known Vulnerabilities  Insufficient Logging & Monitoring  [Severity 1] Injection Flaws occur because user-controlled input is interpreted as actual commands or parameters by the application. Injection attacks depend on what technologies are being used and how exactly the input is interpreted by these technologies.   Common…

    Read More THM – OWASP Top 10 – Part 12Continue

Page navigation

Previous PagePrevious 1 … 3 4 5 6 7 Next PageNext

© 2026 BOOK_GHANIM

Search
  • Programming
    • C#
    • Python
  • CyberSec
    • Articles
    • Handbooks
      • Active Directory – Notes, Methodology, Cheatsheet
      • AV Evasion 101: Essential Techniques and Concepts
      • Buffer Overflow – Notes and cheatsheet
      • Command And Control – C2 Framework
      • OSEP Checklist
      • Pivoting and port forwarding guide
      • THM – Windows Privilege Escalation – Part 16
      • THM – Linux Privilege Escalation – Part 15
      • THM – Common Linux Privilege Escalation – Part 20
      • THM – NMAP Documentation and Commands – Part 13
      • THM – What the Shell – Part 19
    • Notes
    • Write-ups
  • Guides
    • HomeLab
    • Homelab Cheatsheet
  • Handbooks
    • Handbook I ? Basic
    • Handbook II ? Advanced
    • Handbook III ? Cloud
    • Handbook IV ? RedTeam
    • Handbook V ? Maldev
  • Methodology
  • Toolbox
  • About
  • Search