Profile cover photo
Profile photo
Josh Hoss
9 followers
9 followers
About
Posts

Post has attachment
SANS Netwars Experience & CyberCity
Last week I had the wonderful opportunity to partake in the SANS Netwars competition as well as the CyberCity challenge while taking Sec504 at Pentest Austin. Let me start by saying that if you are trying to figure out if you should do it, dive right in and...
SANS Netwars Experience & CyberCity
SANS Netwars Experience & CyberCity
jhosssecurity.blogspot.com
Add a comment...

Post has attachment
hackfest2016: Quaoar
Host: MAC OSX VMware Fusion Attacker: Kali Linux Network: Host-Only Target IP: 172.16.136.130 This walk-through will be a little different from my previous posts, mainly the lack of images. I am transitioning to a new host computer and I went through this v...
Add a comment...

Post has attachment
Wallaby's: Nightmare (v1.0.2)
Wallaby's: Nightmare (v1.0.2) - vulnhub https://www.vulnhub.com/entry/wallabys-nightmare-v102,176/ Environment: Virtualization Hardware: virtualbox Host: Mac OSX Attacker: Kali IP: 192.168.56.102 Victim: Wallaby IP: 192.168.56.101 Networking: Host-Only Step...
Wallaby's: Nightmare (v1.0.2)
Wallaby's: Nightmare (v1.0.2)
jhosssecurity.blogspot.com
Add a comment...

Post has attachment
RootMe - ELF32 - Stack buffer overflow basic 2
 RootMe - ELF32 - Stack buffer overflow basic 2 ~ RootMe Environment: Attacker: Putty on Windows OS Vulnerable Machine: URL: https://www.root-me.org/en/Challenges/App-System/ELF32-Stack-buffer-overflow-basic-2 Target: .passwd Walk-Through: 1) This this buff...
Add a comment...

Post has attachment
RootMe - ELF32 - Stack buffer overflow basic 1
ELF32 - Stack buffer overflow basic 1 ~ RootMe Environment: Attacker: Putty on Windows OS Vulnerable Machine: URL: https://www.root-me.org/en/Challenges/App-System/ELF32-Stack-buffer-overflow-basic-1 Target: .passwd Walk-Through: 1) This this buffer overflo...
Add a comment...

Post has attachment
SecTalks: BNE0x03 - Simple ~ VulnHub
BNE0x03 - Simple ~ VulnHub Simple Environment: Attacker: Kali Linux 2016 Vulnerable Machine: Simple URL: https://www.vulnhub.com/entry/sectalks-bne0x03-simple,141/ VMWare Workstation 12 Player Networking: Host-based Internal Target: /root/flag.txt   Walk-Th...
SecTalks: BNE0x03 - Simple ~ VulnHub
SecTalks: BNE0x03 - Simple ~ VulnHub
jhosssecurity.blogspot.com
Add a comment...

Post has attachment
Primer: 1.0.1 ~VulnHub
Primer: 1.0.1 Environment: Attacker: Kali Linux 2016 Vulnerable Machine: Primer 1.0.1 URL: 
https://www.vulnhub.com/entry/primer-101,136/ VMWare Workstation 12 Player Networking: Host-based Internal Target: Not Stated   Walk-Through:  1) Find IP Use netdis...
Primer: 1.0.1 ~VulnHub
Primer: 1.0.1 ~VulnHub
jhosssecurity.blogspot.com
Add a comment...

Post has attachment
SickOs: 1.2 ~ VulnHub
SickOs: 1.1 CTF Walk-Through   Environment: Attacker: Kali Linux 2016 Vulnerable Machine: SickOs1.2 URL: https://www.vulnhub.com/entry/sickos-12,144/  VMWare Workstation 12 Player Networking: Host-based Internal Target: /root/7d03aaa2bf93d80040f3f22ec6ad9d5...
SickOs: 1.2 ~ VulnHub
SickOs: 1.2 ~ VulnHub
jhosssecurity.blogspot.com
Add a comment...

Post has attachment
SickOs: 1.1 ~ VulnHub
SickOs: 1.1 CTF Environment: Attacker: Kali Linux 2016 Vulnerable Machine: SickOs1.1 URL: https://www.vulnhub.com/entry/sickos-11,132/ VMWare Workstation 12 Player Networking: Host-based Internal Walk-through: 1) netdiscover  This is my first step when rese...
SickOs: 1.1 ~ VulnHub
SickOs: 1.1 ~ VulnHub
jhosssecurity.blogspot.com
Add a comment...

Post has attachment
Add a comment...
Wait while more posts are being loaded