<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://kareemwalid.github.io/</id><title>Kareem's Blog</title><subtitle>Blog, Penetration Testing, Red Teaming, Bug hunting, Kareem Walid.</subtitle> <updated>2026-05-17T00:41:10+00:00</updated> <author> <name>Kareem Walid</name> <uri>https://kareemwalid.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://kareemwalid.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://kareemwalid.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Kareem Walid </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>EscapeTwo - Active Directory Machine HTB</title><link href="https://kareemwalid.github.io/posts/Hackthebox_EscapeTwo/" rel="alternate" type="text/html" title="EscapeTwo - Active Directory Machine HTB" /><published>2025-04-25T00:00:00+00:00</published> <updated>2025-04-25T00:00:00+00:00</updated> <id>https://kareemwalid.github.io/posts/Hackthebox_EscapeTwo/</id> <content type="text/html" src="https://kareemwalid.github.io/posts/Hackthebox_EscapeTwo/" /> <author> <name>Kareem Walid</name> </author> <category term="Hack The Box" /> <category term="Active Directory" /> <summary>📝 Description As is common in real-life Windows pentests, we begin this box with pre-given credentials: Username: rose Password: KxEPkKe6R8su 🔍 Enumeration We’ll start with a basic Nmap scan using the following command: nmap -sC -sV -sT 10.10.11.51 we will notice this valuable info DC01.sequel.htb 1433/tcp open Microsoft SQL Server 389/tcp open LDAP 88/tcp open Microsoft Windows ...</summary> </entry> <entry><title>HTB Web challenge-baby interdimensional internet</title><link href="https://kareemwalid.github.io/posts/Track1/" rel="alternate" type="text/html" title="HTB Web challenge-baby interdimensional internet" /><published>1337-01-06T00:00:00+00:00</published> <updated>1337-01-06T00:00:00+00:00</updated> <id>https://kareemwalid.github.io/posts/Track1/</id> <content type="text/html" src="https://kareemwalid.github.io/posts/Track1/" /> <author> <name>Kareem Walid</name> </author> <category term="Hack The Box" /> <category term="Notes" /> <summary>We will solve web challenge from HackTheBox called baby interdimensional internet Let’s get started! okay lets check the source of the page we found this &amp;lt;!-- /debug --&amp;gt; , let’s try requesting this endpoint : okay from the code we can run rce by making post request like this POST / HTTP/1.1 Host: 94.237.57.211:51999 Cache-Control: max-age=0 Accept-Language: en-US,en;q=0.9 Upgrade-...</summary> </entry> <entry><title>Dream Job-1 HTB Writeup</title><link href="https://kareemwalid.github.io/posts/dreamjob/" rel="alternate" type="text/html" title="Dream Job-1 HTB Writeup" /><published>1337-01-05T00:00:00+00:00</published> <updated>1337-01-05T00:00:00+00:00</updated> <id>https://kareemwalid.github.io/posts/dreamjob/</id> <content type="text/html" src="https://kareemwalid.github.io/posts/dreamjob/" /> <author> <name>Kareem Walid</name> </author> <category term="Hack The Box" /> <category term="Notes" /> <summary>challenge Description You are a junior threat intelligence analyst at a Cybersecurity firm. You have been tasked with investigating a Cyber espionage campaign known as Operation Dream Job. The goal is to gather crucial information about this operation. Solution First Task “Who conducted Operation Dream Job?” Lazarus Group Second Task “When was this operation first...</summary> </entry> <entry><title>Sea Machine HTB</title><link href="https://kareemwalid.github.io/posts/Sea/" rel="alternate" type="text/html" title="Sea Machine HTB" /><published>1337-01-04T00:00:00+00:00</published> <updated>1337-01-04T00:00:00+00:00</updated> <id>https://kareemwalid.github.io/posts/Sea/</id> <content type="text/html" src="https://kareemwalid.github.io/posts/Sea/" /> <author> <name>Kareem Walid</name> </author> <category term="Hack The Box" /> <category term="Notes" /> <summary>Enumeration ┌──(kareem㉿Kali)-[~/sea] └─$ nmap -sVC 10.10.11.28 Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-17 05:23 EEST Nmap scan report for 10.10.11.28 Host is up (0.16s latency). Not shown: 998 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 e3:54:e0:72:20:3c:01:42:93:d1:...</summary> </entry> <entry><title>OSCP-HTB Machines</title><link href="https://kareemwalid.github.io/posts/OSCP-Start/" rel="alternate" type="text/html" title="OSCP-HTB Machines" /><published>1337-01-03T00:00:00+00:00</published> <updated>1337-01-03T00:00:00+00:00</updated> <id>https://kareemwalid.github.io/posts/OSCP-Start/</id> <content type="text/html" src="https://kareemwalid.github.io/posts/OSCP-Start/" /> <author> <name>Kareem Walid</name> </author> <category term="OSCP" /> <category term="Hack The Box" /> <category term="Notes" /> <summary>Kareem’s List We will start solving machines from this list and will write writeup for each machine and with stuff i learned from it and also i will write every new trick in my hacking diaries Check the full list So Let’s Get started : Linux machines : Sea-Machine</summary> </entry> </feed>
