WriteUps
LinkedinGithub
  • hackthebox
    • machines
      • Help
      • Bank
      • Busqueda
      • Agile
      • Nodeblog
      • Cerberus
      • Forest
      • Active
      • Academy
      • Beep
      • Traversxec
      • Stocker
      • Soccer
      • Awkward
    • challenges
      • pwn
        • Racecar
        • Hunting
        • You know 0xDiablos
        • Restaurant
  • Binary Exploitation
    • ROP Emporium
      • ret2win32
      • ret2win64
      • split32
      • split64
      • callme32
      • callme64
      • write432
      • write464
  • CTF
    • Nullcon Berlin HackIM CTF 2023
      • Crypto
        • Twin
        • Bmpass
      • Web
        • reguest
        • zpr
    • Intigriti 1337UP LIVE CTF 2022
      • PWN challenges
        • Easy Register
        • Search Engine
    • ENSA SICS CTF 2023
      • Reverse Engineering Challenges
        • S3r14l_Br34k3r
        • R3v_m3
        • End14n_X0R
      • Forensics Challenges
        • Fl4g_Tr4nsf3r_Pr0t0c0l
        • Th3_Uncr4ck4ble_P@$$w0rd
        • h1d33n
        • MR-ROBOT
        • T0p_S3cr3t_0p3r4ti0ns
        • N545
      • Misc Challenges
        • M3t4 M4dn3$$
      • Cryptography Challenges
        • C1PH3R_Huh
        • Warm Up
        • V0y
        • Crypt1c_0bFuSc4t10n
      • Osint Challenges
        • whoami
    • DownUnderCTF 2023
      • Web
        • Proxed
        • actually-proxed
        • grades_grades_grades
    • Urmia CTF 2023
      • Web
        • htaccess
        • Captcha1 | the Missing Lake
        • Captcha2 | the Missing Lake
        • Ecorp
      • Steganography
        • Deb File | The Old Systems
        • Dorna
    • Nullcon HackIM CTF Goa 2023
      • Web
        • Debugger
        • TYPicalBoss
        • IPfilter
    • TJCTF 2023
      • web/outdated
    • Cyber Heroines CTF 2023
      • Web
        • Grace Hopper
        • Radia Perlman
        • Shafrira Goldwasser
      • Forensics
        • Barbara Liskov
        • Margaret Hamilton
        • Elizabeth Feinler
    • Cybercoliseum II CTF 2023
      • Forensics
        • encrypted traffic
    • Huntress CTF 2023
      • Forensics
        • Opposable Thumbs
        • Wimble
    • The Cyber Cooperative CTF 2023
      • pwn
        • crashme
        • medbof
      • rev
        • easycrack
      • web
        • Leaky site
    • niteCTF2023
      • pwn
        • The road not taken
      • misc
        • blindjail
      • crypto
        • babyRSA
    • KnightCTF2024
      • web
        • Readme
        • Kitty
      • pwn
        • Get The Sword
        • The Dragon's Secret Scroll
        • win... win... window...!
    • Cyber Apocalypse 2024: Hacker Royale
      • Crypto
        • Primary Knowledge
        • Iced TEA
        • Blunt
      • Rev
        • BoxCutter
        • PackedAway
        • LootStash
      • Forensics
        • Fake Boost
        • Data Siege
        • Game Invitation
      • Pwn
        • Rocket Blaster XXX
        • Writing on the Wall
        • Pet Companion
  • Malware Developement
    • Essentials
      • EXE vs DLL
      • Payload Storage
        • Storing Payload in .text Section
        • Storing Payload in .data Section
        • Storing Payload in .rsrc Section
      • Dropper Project
      • Function call obfuscation
  • Portswigger
    • HTTP Host header attacks
      • Basic password reset poisoning
      • Host header authentication bypass
      • Web cache poisoning via ambiguous requests
      • Routing-based SSRF
      • SSRF via flawed request parsing
    • XXE - XML EXTERNAL ENTITIES
      • Exploiting XXE using external entities to retrieve files
      • Exploiting XXE to perform SSRF attacks
      • Blind XXE with out-of-band interaction
      • Blind XXE with out-of-band interaction via XML parameter entities
      • Exploiting blind XXE to exfiltrate data using a malicious external DTD
      • Exploiting blind XXE to retrieve data via error messages
      • Exploiting XInclude to retrieve files
      • Exploiting XXE via image file upload
      • Exploiting XXE to retrieve data by repurposing a local DTD
    • XSS
      • 1) Reflected XSS into HTML context with nothing encoded
      • 2) Stored XSS into HTML context with nothing encoded
      • 3) DOM XSS in document.write sink using source location.search
      • 4) DOM XSS in innerHTML sink using source location.search
      • 5) DOM XSS in jQuery anchor href attribute sink using location.search source
      • 6) DOM XSS in jQuery selector sink using a hashchange event
      • 7) Reflected XSS into attribute with angle brackets HTML-encoded
      • 8) Stored XSS into anchor href attribute with double quotes HTML-encoded
      • 9) Reflected XSS into a JavaScript string with angle brackets HTML encoded
      • 10) DOM XSS in document.write sink using source location.search inside a select element
      • 11) DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded
      • 12) Reflected DOM XSS
      • 13) Stored DOM XSS
      • 14) Reflected XSS into HTML context with most tags and attributes blocked
      • 15) Reflected XSS into HTML context with all tags blocked except custom ones
      • 16) Reflected XSS with some SVG markup allowed
      • 17) Reflected XSS in canonical link tag
      • 18) Reflected XSS into a JavaScript string with single quote and backslash escaped
      • 19) Reflected XSS into a JavaScript string with angle brackets and double quotes HTML-encoded and single quotes escaped
      • 20) Stored XSS into onclick event with angle brackets and double quotes HTML-encoded and single quotes and backslash escaped
      • 21) Reflected XSS into a template literal with angle brackets, single, double quotes, backslash and backticks Unicode-escaped
      • 22) Exploiting cross-site scripting to steal cookies
      • 23) Exploiting cross-site scripting to capture passwords
  • Windows
    • Windows Persistance
      • Tampering with Unprivileged Accounts
      • Backdooring Files
      • Abusing Services
      • Abusing Scheduled Tasks
      • Startup Folder
  • Vulnhub
    • how to make virtual box machines work in vmware also ?
    • Mr Robot 1
  • DFIR
    • HTB forensics challenges
      • Reminiscent
      • RogueOne
    • memory forensics
      • KnightCTF 2024 mem challenges
  • Forensics
    • Memory forensics
    • Oxygen Forensic
  • Malware Analysis
    • WannaCry Ransomware
    • Copy of WannaCry Ransomware
Powered by GitBook
On this page

Was this helpful?

  1. Windows

Windows Persistance

Tampering with Unprivileged AccountsBackdooring FilesAbusing ServicesAbusing Scheduled TasksStartup Folder
PreviousWindowsNextTampering with Unprivileged Accounts

Was this helpful?