Wonderland — TryHackMe

Exploiting Search Order Hijacking and Hijacking Imported Python Modules

NOTE: IF YOU HAVE NOT TRIED THE WONDERLAND CHALLENGE FROM TRYHACKME, I RECOMMEND YOU TRY IT OUT ON YOUR OWN BEFORE READING THIS WALKTHROUGH AS IT IS A VERY FUN CTF BOX!

Initial Reconnaissance

Nmap

--

--

--

I am a Pentester who writes about Cybersecurity and anything related to technology.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The top 10 benefits of cloud computing that can help revolutionize your business

For example, a convolutional layer of a model trained to recognize faces can encode information

How to quickly move beyond the Flutter UI and build industry-strength apps based on REST, OpenAPI…

Ranking Web-Hosting Providers 2022

MoSCoW Prioritisation Method in Agile

Inside Kafka’s CLI

DevOps Handy Tool: Com2kube

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Alexis Rodriguez

Alexis Rodriguez

I am a Pentester who writes about Cybersecurity and anything related to technology.

More from Medium

KERnano : The No-Install Pen Testing Tool (for Windows & Linux)

HTB — Search Walkthrough

Runas for hackers

OvertheWire Bandit Walkthrough Level 0–11