{"blog_url":"https://blog.hamayanhamayan.com/","image_url":null,"url":"https://blog.hamayanhamayan.com/entry/2024/07/19/111850","categories":["Security"],"description":"https://app.hackthebox.com/sherlocks/ProcNet Hack The Box Sherlocks\u3068\u306f Sherlock Scenario With the rising utilization of open-source C2 frameworks by threat actors, our red team has simulated the functionalities of one such widely employed framework. The objective of this exercise is to aid blue teams\u2026","author_name":"hamayanhamayan","type":"rich","title":"Hack The Box Sherlocks - ProcNet Writeup","version":"1.0","provider_name":"Hatena Blog","provider_url":"https://hatena.blog","width":"100%","author_url":"https://blog.hatena.ne.jp/hamayanhamayan/","published":"2024-07-19 11:18:50","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fblog.hamayanhamayan.com%2Fentry%2F2024%2F07%2F19%2F111850\" title=\"Hack The Box Sherlocks - ProcNet Writeup - \u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","blog_title":"\u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093","height":"190"}