Safetech Blog - Security Tips and Tricks


by Oana Stoian

Breach: 2.1

Dear all, this day I will present you my way of exploiting the vulnerable machine-Breach 2.1. Many thanks to @mrb3n813 and @VulnHub. For information gathering I will be using nmap:

The  ssh port is opened : 65535, so let’s try to connect to it:

A banner is displayed, and we find out about…

Read More

1,203 total views, 18 views today


by Oana Stoian

PwnLab:init Walkthrough

Thanks to Claor @Chronicoder and VulnHub folks for the opportunity of writing another walkthrough for a very challenging vulnerable machine. First thing first, I fired-up nmap. Usually I do that, run nmap and after that nikto. 😀 As it can be observed, only two ports are of interest: 80 (for HTTP) and 3306, on which runs mysql….

Read More

1,586 total views, 4 views today


by Oana Stoian

Tommy Boy 1 Write-up

If you came here just for the last flag, here it is:

That’s all folks! Thanks for reading this! 🙂 And now, if you want to know the story of TommyBoy machine, let’s start from the beginnig. This challenge has a story, and quite an enjoyable one IMHO and this will make things more…

Read More

571 total views, 10 views today


by Oana Stoian

Mr. Robot Write-up

Being a fan of the series Mr.Robot, I decided to exploit this vulnerable machine added by Jason. Someone once said that the best way to be prepared for a hack when it happens, is to be hacked. So, let’s hack Mr. Robot 🙂 Starting with enumeration, I fired-up nikto, that reveals a lot of useful…

Read More

1,339 total views, 5 views today


by Oana Stoian

Stapler Writeup

In this article I will present you the way I have completed the Stapler machine challenge hosted on Vulnhub. Stapler is particularly interesting because it allows you to perform and obtain a lot of various information through enumeration – one of the best machines for this actually – thanks to @g0tmi1k for this!   Information gathering…

Read More

1,221 total views, 5 views today


by Oana Stoian

Fuku Writeup

There are lots of ways for exploiting Fuku, a machine which is not so easy to compromise – at least not for the patienceless, as it has some interesting defense mechanisms – some of them you will discover below, some of them  I’ll let you discover 🙂 Today, I’ll show you my way.   First…

Read More

598 total views, 2 views today


by Ionut Cernica

AT&T – Old version of JBoss and default credentials

I found an old JBoss console on one of the AT&T subdomains https://espcare.att.com/ There was an old version of JBoss web application, the application was vulnerable to authentication bypass, not to mention that I was able to authenticate with default username and password. Risk: I was able to deploy my desired application on the server…

Read More

197 total views, no views today


by Ionut Cernica

Parse.com security problem

This is a writeup for a security problem in parse.com website. Parse.com is an acquisition of facebook and every security problem on this website is eligible for a bounty in the facebook bugbounty program.   There was a problem with the download URL for important information about the applications you manage on your account. The…

Read More

199 total views, no views today


by Ionut Cernica

Codegate 2014 quals – web 200 WriteUp

WebProxy WriteUp We were given a web application with a proxy functionality.

In the response from the server a comment can be found which contains the link where the flag might be.

The request type is “GET” and it has one parameter named “url”.

The value of the “url” parameter is filtered….

Read More

173 total views, 2 views today


by Marinel

How to: Secure and Privacy Enabled Browsing

There are plenty of guides on the web about securing your computer against threats you can encounter on the internet, while making your browsing habits hassle free and enjoyable. Most of the guides teach you basic stuff about how to install antivirus and other anti-malware suites, check your browser for toolbars and extensions, whether your…

Read More

174 total views, 2 views today