Home
rubenhortas@blog
Cancel

Process argument spoofing in GNU/Linux

Process argument spoofing (command line spoofing or program argument spoofing) is a technique that allow us to spawn a process with arguments and override those arguments at execution time. With th...

Configuring Neovim as Rust IDE

Update! Dear reader, this post has become outdated over time. I’ve found a better way to convert Neovim into a multi-language IDE in a much simpler and more modular way, which makes maintenance...

Hack the box - Headless pwned!

Headless info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.60 Target machine (victim, Headless): 10.10.1...

Hack The Box - Fentastic Moves pwned!

Description Garry told me to catch some fish 20 meters Solution To solve this challenge, I did a python script that you can see at: deepy_blue Fentastic Moves has been Pwned Enjoy! ;)

Hack the box - Perfection pwned!

Perfection info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.108 Target machine (victim, Perfection): 10...

Hack the box - Bizness pwned!

Machine info Bizness info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.79 Target machine (victim, Bizne...

Hack the box - Analytics pwned!

Machine info Analytics info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.101 Target machine (victim, De...

Excluding local files in git without creating a .gitignore

Let’s suppose that you have cloned a git third-party repository and, locally, inside the repository, you have new (and untracked) files. These files could be files created by you, by text editors, ...

Hack the box - Codify pwned!

Machine info Codify info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.96 Target machine (victim, Codify...

Hack the box - CozyHosting pwned!

Machine info CozyHosting info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.96 Target machine (victim, C...