A picture of the author.

Hi, I am Raju Talukder.


Cyber Security Researcher

Cyber Security is an illusion & Researcher is my passion.


View More about me

Blog Posts

Vulnhub Funbox 2 Walkthrough

Vulnhub Funbox 2 Walkthrough

This box is very straightforward; there is nothing complex that we need to know about some tools. From the FTP, we obtained numerous zip files encrypted with passwords. We decrypted...

r@ju r@ju
Vulnhub Funbox 3 Walkthrough

Vulnhub Funbox 3 Walkthrough

This box was quite interesting to me. I found lots of rabbit holes here. Initially, we discovered three applications. The admin application was vulnerable to SQL injection (SQLi), and we...

r@ju r@ju
Vulnhub Funbox 1 Walkthrough

Vulnhub Funbox 1 Walkthrough

I personally found this box quite interesting. To gain the initial foothold, I ran WPScan with a password list, using rockyou.txt which led to the discovery of two valid user...

r@ju r@ju
Vulnhub Five86 1 Walkthrough

Vulnhub Five86 1 Walkthrough

There are two enabled HTTP services and one SSH service. One of the HTTP services, called ‘opennetadmin,’ is outdated and has a publicly available exploit that provides the initial foothold....

r@ju r@ju
Vulnhub Five86 2 Walkthrough

Vulnhub Five86 2 Walkthrough

This is the last machine so far from this five86 series. This series proved to be interesting, offering numerous learning opportunities. Among the publicly available ports, FTP and the web...

r@ju r@ju
Vulnhub Mr. Robot 1 Walkthrough

Vulnhub Mr. Robot 1 Walkthrough

Mr. Robot-1

r@ju r@ju
Vulnhub Aragog Walkthrough

Vulnhub Aragog Walkthrough

This box is pretty straightforward; nothing complex here. Enumeration is the key. We need to enumerate and use the gathered information at the perfect moment. From the Nmap scan, we...

r@ju r@ju
Vulnhub DC-6 Walkthrough

Vulnhub DC-6 Walkthrough

For the initial foothold, we initiated a password brute-force attack based on a custom-generated password list, following a clue provided by the box’s author. After obtaining the password, we were...

r@ju r@ju
Vulnhub DC-5 Walkthrough

Vulnhub DC-5 Walkthrough

This box proved to be quite engaging for me. The initial foothold presented an interesting challenge. Understanding the application’s workflow and identifying a hidden parameter vulnerable to LFI with code...

r@ju r@ju
Vulnhub DC-4 Walkthrough

Vulnhub DC-4 Walkthrough

This box was so easy. There are only two ports open: SSH and the HTTP server. For the initial foothold, we need to attempt a brute force attack on the...

r@ju r@ju
Vulnhub DC-2 Walkthrough

Vulnhub DC-2 Walkthrough

This box is really easy, relying entirely on reconnaissance skills. For the initial foothold, we need to identify the CMS and its version. Once the CMS version is identified, there...

r@ju r@ju
Vulnhub DC-2 Walkthrough

Vulnhub DC-2 Walkthrough

This box provided a valuable learning experience. To gain the initial foothold, I created a custom word list using the ‘cwel’ tools. After generating the word list, I executed WPScan...

r@ju r@ju
Vulnhub DC-1 Walkthrough

Vulnhub DC-1 Walkthrough

This box is relatively straightforward; there are publicly available exploits that make it even easier. To gain an initial foothold, all we need to do is identify the service and...

r@ju r@ju
Connect with me