p r o c l e a p

explore & exploit

Latest Post

May 2, 2020

OpenAdmin (Hackthebox)

Another relatively easy box from Hackthebox. I say relatively because I failed to successfully stablish a reverse shell connection during the initial foothold due to some unknown issue (I need to dig more into it later). Nevertheless the box presented a quite good mix of real world vulnerability exploitation with some CTF-like twists to throw you off a bit… So much talking — let’s crack it open! Enumeration As usual I started with my default nmap scan: Read more

About

Hi, I’m Eduardo. In this page I share some insights and technical stuff about Cybersecurity and Reverse Engineering, two subjects dearer to my heart. You can either find me on Twitter or pushing code to Github. In case I’m hiding or laying low you better drop me an old fashionable email.

Eduardo

procleap@gmail.com