I am using fmt.Scanln() to read user's input, the reader stops at newline, on previous case I use fmt.Scanf() but it reads the first input and terminates. This is part of an exercise for my golang tutorial.
Reference: https://github.com/golang/go/wiki/Iota iota is used to declare incremental constants, each constant block will start iota with 0, then each constant within the block will increment the iota. Iota resets back to 0 if it is declared on another constant block.
Another exercise on golang, experience in python helps me pick up golang rather quickly. calculate the area of a circle.
This is an exercise of my golang course. The purpose is to convert Fahrenheit to Celcius
I have been doing a few HTB machines and used some tools for enumeration and a lot of those tools are made from Golang, I wished to create my own tool in Go and hence I am starting to learn about the language. Here is a code snippet on how to interact with OS commands. … Continue reading [Go]Execute commands in Linux
Introduction Jeeves is a machine that is rated easy, this machine is hacked through exploiting unauthenticated jeeves dashboard usage. A java reverse shell is executed in Jeeves' console script (where groovy script can be run for troubleshooting) is run and a reverse connection is connected back to my netcat server. Once the reverse connection is … Continue reading [hackthebox]Jeeves
Introduction This is an interesting machine, it is rated as medium difficulty, there are a few techniques such as sql injection, memcache enumeration and docker privilege escalation. I have learned memcache and docker privesc from this machine and deepened my familiarity with sqlmap, sqlmap in my opinion is the most difficult technique as there are … Continue reading [hackthebox]Cache
Introduction I attempted this retired machine without reading the htb guides, I went through a lot of rabbit holes and eventually found that the oracle tns port 1521 is the entry point. On testing the silo machine I found that it is susceptible to tns poisoning, searching on the web I found this invaluable article … Continue reading [hackthebox]Silo
Enumeration This section describes the reconnaissance techniques used to find foothold to start, the purpose is to understand the machine before issuing attacks. nmap enumeration nmap -A -p- -oN heist -vvv 10.10.10.149 The machine is listening to these services: tcp/135 - rpc, possible to enumerate with rpcclient. tcp/445 - SMB, check whether the smb is … Continue reading [hackthebox]Heist
There is no excerpt because this is a protected post.