Hack the Box (HTB) machines walkthrough series — Cascade (part 2)

We’re continuing from Part 1 of this machine, where we carried out a lot of enumeration and decoding to gain shell access as the user s.smith while also recovering the user flag. In this second part of the article, we will finish with this machine by e… Continue reading Hack the Box (HTB) machines walkthrough series — Cascade (part 2)

Meet the Corelight CTF tournament winners

By John Gamble, Director of Product Marketing, Corelight This summer, Corelight hosted a virtual CTF tournament where hundreds of players raced to solve security challenges using Zeek data in Splunk and Elastic. After the preliminary rounds,  we invite… Continue reading Meet the Corelight CTF tournament winners

Hack the Box (HTB) machines walkthrough series — Nest, part 2

Today, we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is of an HTB machine named Nest. This is the second half of the…
Go on to the site to read the full article
The post Hack… Continue reading Hack the Box (HTB) machines walkthrough series — Nest, part 2