<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://challoufghassen.github.io/</id><title>Glitch.</title><subtitle>A minimal, responsive and feature-rich Jekyll theme for technical writing.</subtitle> <updated>2025-06-18T17:53:04+01:00</updated> <author> <name>challouf gahssen</name> <uri>https://challoufghassen.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://challoufghassen.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://challoufghassen.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2025 challouf gahssen </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Billing</title><link href="https://challoufghassen.github.io/posts/billing/" rel="alternate" type="text/html" title="Billing" /><published>2025-06-17T00:00:00+01:00</published> <updated>2025-06-18T16:30:18+01:00</updated> <id>https://challoufghassen.github.io/posts/billing/</id> <content type="text/html" src="https://challoufghassen.github.io/posts/billing/" /> <author> <name>challouf gahssen</name> </author> <category term="Web" /> <category term="Easy" /> <summary>Billing - TryHackMe Writeup Billing was a straightforward room where we exploited a command injection vulnerability in the MagnusBilling web application to gain an initial foothold. Afterwards, using our sudo privileges, which allowed us to interact with and configure the fail2ban-server, we successfully escalated to the root user and completed the room. Step 1: Initial Reconnaissance with Nma...</summary> </entry> <entry><title>Pickle Rick</title><link href="https://challoufghassen.github.io/posts/Pickle-Rick/" rel="alternate" type="text/html" title="Pickle Rick" /><published>2025-06-13T00:00:00+01:00</published> <updated>2025-06-13T23:09:12+01:00</updated> <id>https://challoufghassen.github.io/posts/Pickle-Rick/</id> <content type="text/html" src="https://challoufghassen.github.io/posts/Pickle-Rick/" /> <author> <name>challouf gahssen</name> </author> <category term="Web" /> <category term="Easy" /> <summary>Pickle Rick - TryHackMe Writeup This guide walks through solving the Pickle Rick TryHackMe challenge, a beginner-friendly CTF focused on web enumeration and shell techniques. Since TryHackMe machines use dynamic IPs, replace &amp;amp;lt;targetIP&amp;amp;gt; with the target machine’s IP and &amp;amp;lt;yourIP&amp;amp;gt; with your attacking machine’s IP. Step 1: Initial Reconnaissance with Nmap Scan the target to identify op...</summary> </entry> <entry><title>Zeus Banking Trojan</title><link href="https://challoufghassen.github.io/posts/Zeus-Banking-Trojan/" rel="alternate" type="text/html" title="Zeus Banking Trojan" /><published>2025-03-27T00:00:00+01:00</published> <updated>2025-05-04T20:45:01+01:00</updated> <id>https://challoufghassen.github.io/posts/Zeus-Banking-Trojan/</id> <content type="text/html" src="https://challoufghassen.github.io/posts/Zeus-Banking-Trojan/" /> <author> <name>challouf gahssen</name> </author> <category term="guid" /> <summary>Malware Analysis Report: zeus.pdf.exe Zeus Trojan Overview Background Information Purpose: Primarily created to be a financial banking trojan. First Spotted: 2007, when Zeus Trojan was caught stealing sensitive information from systems owned by the U.S. Department of Transportation. Variants: Over 573 known versions and 36 known families, according to Zeus Museum. Code Leak: Maliciou...</summary> </entry> <entry><title>(¯`·.¸¸.·´¯`·.¸¸.-> ᕼ𝓪𝓬ⓚＩηᎶ <-.¸¸.·´¯`·.¸¸.·´¯)</title><link href="https://challoufghassen.github.io/posts/" rel="alternate" type="text/html" title="(¯`·.¸¸.·´¯`·.¸¸.-&amp;gt; ᕼ𝓪𝓬ⓚＩηᎶ &amp;lt;-.¸¸.·´¯`·.¸¸.·´¯)" /><published>2024-12-22T00:00:00+01:00</published> <updated>2024-12-22T20:48:33+01:00</updated> <id>https://challoufghassen.github.io/posts/</id> <content type="text/html" src="https://challoufghassen.github.io/posts/" /> <author> <name>challouf gahssen</name> </author> <category term="TryHackMe" /> <summary>🔴 RedTeam 0.Bookmark Redteam Approach This guide outlines a systematic approach to compromising a target host, starting from reconnaissance to post-exploitation. By following these steps, you’ll identify vulnerabilities, exploit weaknesses, maintain persistence, and exfiltrate valuable data, all while covering your tracks. Steps 1. Initial Reconnaissance Passive Reconnaissance Gather initial...</summary> </entry> <entry><title>The Sticker Shop</title><link href="https://challoufghassen.github.io/posts/The-Sticker-Shop/" rel="alternate" type="text/html" title="The Sticker Shop" /><published>2024-11-30T00:00:00+01:00</published> <updated>2024-11-30T00:00:00+01:00</updated> <id>https://challoufghassen.github.io/posts/The-Sticker-Shop/</id> <content type="text/html" src="https://challoufghassen.github.io/posts/The-Sticker-Shop/" /> <author> <name>challouf gahssen</name> </author> <category term="TryHackMe" /> <summary>The Sticker Shop is a easy rated room on TryHackMe, We inspected the webpage by opening the site and using the Inspect Element tool. During this process, we found an endpoint named submit_feedback. We then navigated to the URL: http://10.10.50.243:8080/submit_feedback. This raised the possibility of a Cross-Site Scripting (XSS) vulnerability. To investigate further, we proceeded with testin...</summary> </entry> </feed>
