This post provides a step-by-step guide for exploiting a machine named 'SolarFlare' by using various penetration testing techniques. It starts with nmap scans to identify open ports and services, proceeds to exploit memcache for session details, and concludes with log injection to secure a reverse shell and access the victim's

4m read timeFrom systemweakness.com
Post cover image
Table of contents
Pentester. s3rd4r308 has one repository available. Follow their code on GitHub.

Sort: