Open in app

Sign In

Write

Sign In

Neelesh Patel
Neelesh Patel

59 Followers

Home

About

Pinned

Hey, I have some Updates!!

🔔 This platform is not maintained regularly as of yet. I’m building a better platform — notnue.github.io The platform will include everything from developing, pwning machines to pure exploitations along with malware analysis and reverse engineering, some of my happiest moments, blogs, random days doings and much much more!!! Until then, OSINT out notnue.github.io and I’ll see you on the internet.

Cool

1 min read

Cool

1 min read


Mar 9, 2022

Root-me Challenges(Networks)

Investigate captured traffic, network services and perform packet analysis — — — — — — — — — — — — — — — — — — — — — — — — — — — FTP — authentication The first challenge in the networks was FTP-Authentication which I did by packet analysis. I used tshark instead of Wireshark. Open the terminal…

Root Me

3 min read

Root-me Challenges(Networks)
Root-me Challenges(Networks)
Root Me

3 min read


Feb 18, 2022

O’cmon, rbash is hated one too!

Breaking out of a Restricted shell Why do I even care? You have to!! My end goal is spawning a bourne shell.What are the initial steps? Grab a valid tty of your default OS (tty: it’s a teletypewriter for terminal) Your running OS? Take hold of those binaries. But how…

Tty Prompt

2 min read

O’cmon, rbash is hated one too!
O’cmon, rbash is hated one too!
Tty Prompt

2 min read


Feb 9, 2022

Vulnhub Series →DC-1

Greetings, I’m Neelesh, The pwned machine is first part of DC series from Vulnhub-Offensive Security. So let’s get started! Initially after arp scan, we got the target IP and exported the target IP as environment variable and started the nmap scan: Clearly, by looking at the results we jumped to…

Infosec

2 min read

Vulnhub Series →DC-1
Vulnhub Series →DC-1
Infosec

2 min read


Jan 4, 2022

GAARA — Offensive Security PG Play

“Long time, No see…. NARUTO!!..” We start the enumeration process with a simple Nmap scan: nmap -p- -sC -sV — open -o nmap.txt $IP

Naruto

2 min read

GAARA — Offensive Security PG Play
GAARA — Offensive Security PG Play
Naruto

2 min read


Dec 13, 2021

HEADLESS! — Vulnerable Machine

This VM Image is beginner friendly machine. The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player). There are more ways then one to successfully complete the challenges. Download link 1: https://www.dropbox.com/sh/t04oh0gxags8k3u/AABCTCFDQ1fQpZkPrv7K2Pffa?dl=0 Download Link 2: https://drive.google.com/file/d/1Bj1Tbk1PHTFFCCFN1mMDjaJ1WprVXyyG/view?usp=sharing

Hacking

2 min read

HEADLESS! — Vulnerable Machine
HEADLESS! — Vulnerable Machine
Hacking

2 min read


Nov 13, 2021

Pwning Photographer!!- OSCP Type Machine Write-up

This is one of the intermediate machine from Offensive Security Proving Grounds!. So let’s dive in as per our goal. Greetings!!!, Okay so… Target: 10.0.2.9 Exporting IP as environment variable and scanned victim’s machine quietly ;-) the results are:

Offensive Security

3 min read

Pwning Photographer!!- OSCP Type Machine Write-up
Pwning Photographer!!- OSCP Type Machine Write-up
Offensive Security

3 min read


Nov 6, 2021

Pwning Solstice! — Offensive Security Machine

This is one of the intermediate machine from Offensive Security Proving Grounds exported IP as environment variable and scanned for services and findings as

Offensive Security

3 min read

Solstice — Offensive Security Machine
Solstice — Offensive Security Machine
Offensive Security

3 min read


Oct 27, 2021

BORN2ROOT — Offensive Security

Offensive Security Proving Ground Complete Write-up Exporting IP of the target machine as environment variable and scanned the target and found open ports and services as: After switching up to port 80, three users found as martin, hadi, jimmy. COOL!!

Offensive Security

3 min read

BORN2ROOT —  Offensive Security
BORN2ROOT —  Offensive Security
Offensive Security

3 min read


Oct 11, 2021

Tre — Offensive Security Machine Complete Write-up

OSCP Type intermediate machine This is one of the official machine from Offensive Security Proving Grounds So starting of by exporting IP as environment variable and starting out with scanning services and open ports and found Target IP: 192.168.100.133

Offensive Security

3 min read

Tre — Offensive Security Machine Pwned!!
Tre — Offensive Security Machine Pwned!!
Offensive Security

3 min read

Neelesh Patel

Neelesh Patel

59 Followers

All I need is just my ten fingers and sometimes {coffee}, to talk to computers.

Following
  • Veshraj Ghimire

    Veshraj Ghimire

  • Maciej Zalwert

    Maciej Zalwert

  • Khushi Kapoor

    Khushi Kapoor

  • Haris Muthusamy

    Haris Muthusamy

  • Leo Pitt

    Leo Pitt

See all (16)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams