: day 66 : Took a crack at new release, Inject. I've gotten rusty.

: day 27d : Took another look at the new release. Making some progress.

: day 26d : New release on , but it's not coming easily. Found a thing to help with enumeration, but I need to do some more reading on php to get to the next bit.

: day 20d : Worked on Jet fortress. Got another flag. More php tricks.

: day 19d : Worked on new release, investigation and managed to get user and root. I used to be strong in perl... ...it was in the last century, though! LOL.

: day 13d : Took a crack at Fortress lab Jet. I'm about a third of the way through. I keep breaking the box trying to get the next flag. Reckon that's a hint what I'm doing is the wrong path for this one.

: day 12d : Banged around on release arena's stocker box. It's rated easy, but the foothold was new territory for me, so not too easy. Learned some new stuff, so that's good.

: Day 7d : Kept chipping away at new release broscience. Good challenge for testing. Recognized an top 10 vulnerability, but I needed a nudge on how to get ZAP to help me exploit it--Replacer, ftw. Still have some enumeration to do to figure out initial access. Incremental progress is still progress...

: Day 7d : Kept chipping away at new release broscience. Good challenge for testing. Recognized an top 10 vulnerability, but I needed a nudge on how to get ZAP to help me exploit it--Replacer, ftw. Still have some enumeration to do to figure out initial access. Incremental progress is still progress...

: Day 6d: Continued working on new release bioscience. Went down some enumeration rabbit holes. Found some usernames. Still need to figure out initial access.

: Day 5d : Worked on new release broscience. (Went to a basketball game today, which took a lot of time. M-I-Z!)

: Day 2b : new release today. Needed a few nudges and learned about a newer feature in some tooling and about a tool that comes on Linux I hadn’t seen before.

: Day 21 : More again. Still chipping away at awkward. I'm likely running around in a rabbit hole. Better here than on a job, I reckon. Time to look through the forums.

: Day 20 : More . Worked on awkward and got user. Still working out root. Also worked on carpediem, but didn't get any further than last time. Then went down a password cracking rabbit hole. Trying out JtR and incremental filters.

: Day 19 : release day. Worked on Precious an "easy" linux box. Pretty straightforward.

: Day 5 : Took a crack at new release, Forgot. Learned some stuff, so that's good. I'm still slow, but eventually got root. I think some of it was more CTF than real life, but I look forward to seeing the reviews from the old hands.

: Day2 : Tuned in to @Alh4zr3d@twitter's twitch (twitch.tv/alh4zr3d). He streamed pwning the Tricky box. Watched @mttaggart's _Practical Webapp Security and Testing_ (academy.tcm-sec.com) (henceforth, PWST), sections 4-6 and 4-7. Need to spend some more time on 4-7 and the javascript trickiness.

Day56: More cracking at trick.htb. Found a thing on an entry point, but I'm stuck turning it into something more useful. Tantalizing config on entry point two, but it isn't giving me any goods.

Day55: More banging on trick.htb. Found a new potential entry point. Took a while to figure out how to find it, but didn't get terribly far on it before I had to pack it in.

Day53: Got creds from yesterday's scans. Explored the app, looking for escalation vector. Found limited LFI, so progress!

Show more

ath0

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.