DIGITALWORLD.LOCAL: JOY

Enumeration

  • Always keep http enumeration at the end since it has larger attack surface.
  • We can use CPFR/CPTO command in FTP and get reverse shell. but we require certain parameters for it.
from SNTP enumeration

Exploitation

--

--

--

What could be more fun than breaking stuffs!!!

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Ludo Voice Hack Free Resources Generator

The hacker who hacked the #CreamFinance #DeFiprotocol transferred 97% of the stolen amount to the…

Saving Your Self

{UPDATE} Solitaire Hard Pro Hack Free Resources Generator

{UPDATE} vocabulario de ingles aprendizaje preescolar Hack Free Resources Generator

Cyber attacks are taking toll on half of the small business owners without their knowledge

I am firing up honeypot w/ Docker for educational purposes!

Infra news #14 2019 10/21~10/25

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Gowthamaraj

Gowthamaraj

What could be more fun than breaking stuffs!!!

More from Medium

Log4Shell — Too Close to Home

Random Lego Build — Outrider (REDLINE)

Revenge of the Printers: CVE-2021–34527 PrintNightmare Vulnerability