<feed xmlns="http://www.w3.org/2005/Atom"> <id>/</id><title>4jai</title><subtitle>We work in the dark to serve the light</subtitle> <updated>2025-06-20T23:30:57+08:00</updated> <author> <name>Ajai</name> <uri>/</uri> </author><link rel="self" type="application/atom+xml" href="/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2025 Ajai </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>BloodHound Setup</title><link href="/posts/BloodHound-Setup/" rel="alternate" type="text/html" title="BloodHound Setup" /><published>2025-06-19T01:00:00+08:00</published> <updated>2025-06-20T23:30:40+08:00</updated> <id>/posts/BloodHound-Setup/</id> <content type="text/html" src="/posts/BloodHound-Setup/" /> <author> <name>Ajai</name> </author> <category term="Active Directory" /> <summary>BloodHound is an Active Directory (AD) enumeration tool used by both attackers and defenders to map out relationships and permissions within an AD environment. It collects data (using tools like SharpHound) and visualizes it as a graph, revealing hidden attack paths, privilege escalations, and lateral movement opportunities such as finding which low-privilege user can eventually gain Domain Adm...</summary> </entry> <entry><title>HackTheBox - ServMon</title><link href="/posts/HTB-ServMon/" rel="alternate" type="text/html" title="HackTheBox - ServMon" /><published>2025-06-03T01:00:00+08:00</published> <updated>2025-06-03T01:00:00+08:00</updated> <id>/posts/HTB-ServMon/</id> <content type="text/html" src="/posts/HTB-ServMon/" /> <author> <name>Ajai</name> </author> <category term="HackTheBox" /> <summary>Kembali lagi dengan tingkap apa hari ini. Today we do HackTheBox ServMon. It’s rare for me to do HTB actually. To make things easy, we will use guided mode. Nmap Scan Let’s start with standard nmap scan. nmap -sC -sV 10.129.242.236 Only port scan ┌──(kali㉿kali)-[~/HackTheBox/HTB_ServMon] └─$ nmap -Pn 10.129.242.236 Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-02 12:34 EDT N...</summary> </entry> <entry><title>TryHackMe - Team</title><link href="/posts/THM-Team/" rel="alternate" type="text/html" title="TryHackMe - Team" /><published>2025-04-26T01:00:00+08:00</published> <updated>2025-04-26T01:00:00+08:00</updated> <id>/posts/THM-Team/</id> <content type="text/html" src="/posts/THM-Team/" /> <author> <name>Ajai</name> </author> <category term="TryHackMe" /> <summary>We back with our training yay. Let’s just friesing go. Today we will do TryHackMe room called Team. Nmap Scan As usual, let’s nmapping. Looking at the Nmap result, there are three port that available in this room. Port 21, 22, and 80. The FTP port doesn’t seem to be login via Anonymous. Port 80 show that there are domain that need to be added called team.thm, let’s add it into our /etc/hos...</summary> </entry> <entry><title>TryHackMe - IDE</title><link href="/posts/THM-IDE/" rel="alternate" type="text/html" title="TryHackMe - IDE" /><published>2025-04-26T01:00:00+08:00</published> <updated>2025-04-26T01:00:00+08:00</updated> <id>/posts/THM-IDE/</id> <content type="text/html" src="/posts/THM-IDE/" /> <author> <name>Ajai</name> </author> <category term="TryHackMe" /> <summary>Hola, como estas? Today in my training, I need to do TryHackMe IDE room WITHOUT INTERNET. Let’s see how it going. Let’s dive into it. Port Scan After getting IP address, we start our enumeration with few basic Nmap scan. My basic scan Only all port scan Basic Scan nmap -sC -sV &amp;amp;lt;ip-address&amp;amp;gt; -oN nmap.scan There are three common open port that we can see here, port 21 (ftp), ...</summary> </entry> <entry><title>TryHackMe - Attacktive Directory</title><link href="/posts/THM-Attacktive-Directory/" rel="alternate" type="text/html" title="TryHackMe - Attacktive Directory" /><published>2025-04-26T01:00:00+08:00</published> <updated>2025-05-05T00:51:00+08:00</updated> <id>/posts/THM-Attacktive-Directory/</id> <content type="text/html" src="/posts/THM-Attacktive-Directory/" /> <author> <name>Ajai</name> </author> <category term="Active Directory" /> <category term="TryHackMe" /> <summary>みなさんこんにちは Today I in the mood to learn Active Directory attacking. So, let’s go. We will do Attacktive Directory room in TryHackMe today. https://tryhackme.com/room/attacktivedirectory Let’s try to answer all the question What tool will allow us to enumerate port 139/445? Answer: enum4linux I actually thinking what tools that we need to answer, it actually enum4linux. Enum4linux is an...</summary> </entry> </feed>
