Hello username.
welcome to this channel about different aspects of hacking. It’s planned to be a personal blog to share different writeups and resources, that might comes handy in your journey of penetration testing, exploit development, or bug bounty hunting.
Hack the planet!
welcome to this channel about different aspects of hacking. It’s planned to be a personal blog to share different writeups and resources, that might comes handy in your journey of penetration testing, exploit development, or bug bounty hunting.
Hack the planet!
I'd like to start with the classic. One of my very first writeups - Mister Robot.
#vulnhub #pentest
https://telegra.ph/Mister-Robot-writeup-09-20
#vulnhub #pentest
https://telegra.ph/Mister-Robot-writeup-09-20
Telegraph
Mister Robot
In this writeup, I will cover an awesome machine from the VulnHub - Mr.Robot. There is also a version of that machine on TryHackMe! Description:
An easy #hackthebox machine where you can practice your Active Directory pentest skills:
https://telegra.ph/Forest-writeup-09-21
https://telegra.ph/Forest-writeup-09-21
Telegraph
Forest writeup
Forest is an awesome Windows-based machine, difficulty was set as “Easy”, user score is 4.6. This machine is all about Active Directory exploitation.
Another "classic" Active Directory based machine from HTB. Both Sauna and Forest are currently listed in TJNull's list that can help you to prepare yourself for OSCP exam.
#pentest #ActiveDirectory #hackthebox
https://telegra.ph/Sauna-writeup-09-21
#pentest #ActiveDirectory #hackthebox
https://telegra.ph/Sauna-writeup-09-21
Telegraph
Sauna
Sauna is a great machine for sharpening your Active Directory skills. To solve this machine you have to properly enumerate the domain, and with a pinch of OSINT, find the correct username. The hash for the user might be captured by the AS-REP Roasting attack.…
The list itself, in case if you don't know what I'm referring to. This is probably the best resource on your journey to become an #OSCP holder. There are both, #vulnhub and #hackthebox machines with different levels of difficulty. Bonus points for those who can actually figure out why each machine is listed there 😉
https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8
https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8
Google Docs
NetSecFocus Trophy Room
A bunch of next writeups will be for
It's also a nice way to prepare yourself for the #OSCP exam, so I noted down almost all writeups for it as well.
Enjoy!
Offensive Pentesting learning path from #tryhackme. You can learn more about it here: https://tryhackme.com/path/outline/pentesting. It's also a nice way to prepare yourself for the #OSCP exam, so I noted down almost all writeups for it as well.
Enjoy!
TryHackMe
Offensive Pentesting
Acquire the skills needed to go and get certified by well known certifiers in the security industry. Learn about industry-used penetration testing tools and attain techniques to become a successful penetration tester.
The Vulnversity will be the first machine in this series. It's a pretty classic exploitation path for the web server with further privilege escalation process via abusing the SUID bit on one of the binaries. For all machines in this series I put takeaways at the end of the writeup.
#tryhackme #pentest
https://telegra.ph/Vulnversity-09-22
#tryhackme #pentest
https://telegra.ph/Vulnversity-09-22
Telegraph
Vulnversity
Vulnversity is the first machine in TryHackMe’s “Offensive pentesting” path.
Exploiting the legendary EternalBlue (CVE-2017-0144) vulnerability in this TryHackMe machine.
#pentest #tryhackme
https://telegra.ph/Blue-09-22-4
#pentest #tryhackme
https://telegra.ph/Blue-09-22-4
Telegraph
Blue
Blue is the second machine in TryHackMe’s “Offensive pentesting” path.
Kenobi is the third machine in TryHackMe’s
#pentest #tryhackme
https://telegra.ph/Kenobi-09-22
Offensive pentesting path. Identifying and exploiting the vulnerability in FTP server. To escalate privileges to root you will need to use the combination of SUID binary and PATH variable. #pentest #tryhackme
https://telegra.ph/Kenobi-09-22
Telegraph
Kenobi
Kenobi is the third machine in TryHackMe’s “Offensive pentesting” path.
Another Mr.Robot-themed machine. Exploiting the HTTP file server to get the initial shell, and finding a
#tryhackme #pentest
https://telegra.ph/Steel-Mountain-09-23
Unquoted Service Path vulnerability to privesc, #tryhackme #pentest
https://telegra.ph/Steel-Mountain-09-23
Telegraph
Steel Mountain
Steel Mountain is the first machine in the “Advanced Exploitation” part of TryHackMe’s “Offensive pentesting” path. > Enumeration By scanning the machine with nmap we can see that both port 80 and port 8080 are running the HTTP services. Port 80 has nothing…
From Mr.Robot to Batman! In Alfred you will need to exploit misconfigured
#tryhackme #pentest
https://telegra.ph/Alfred-09-23
Jenkins instance, and on a later stage impersonate a client with the SeImpersonatePrivilege role. #tryhackme #pentest
https://telegra.ph/Alfred-09-23
Telegraph
Alfred
Alfred is the second machine in the “Advanced Exploitation” part of TryHackMe’s “Offensive pentesting” path. > Enumeration The output of the nmap scan: nmap -sC -sV 10.10.0.34 80/tcp open Microsoft IIS httpd 7.5 3389/tcp open ssl/ms-wbt-server? 8080/tcp open…
Moar themed machines! Next in the line - IT. Bruteforcing our way into the web server, finding the exploit for Remote Code Execution, and getting the root by tampering the misconfigured service.
#tryhackme #pentest
https://telegra.ph/HackPark-09-23
#tryhackme #pentest
https://telegra.ph/HackPark-09-23
Telegraph
HackPark
HackPark is the third machine in the “Advanced Exploitation” part of TryHackMe’s “Offensive pentesting” path. > Enumeration Nmap scan: nmap -sC -sV -o nmap.txt 10.10.37.35 80/tcp open http Microsoft IIS httpd 8.5 3389/tcp open ssl/ms-wbt-server? By navigating…
Theme for the next machine is Hitman, as in this box you will be breaking into the forum about games.
SQL injection for the foothold, and quite tricky PrivEsc as I wanted to avoid using Metasploit.
#tryhackme #pentest
https://telegra.ph/Game-Zone-09-23
SQL injection for the foothold, and quite tricky PrivEsc as I wanted to avoid using Metasploit.
#tryhackme #pentest
https://telegra.ph/Game-Zone-09-23
Telegraph
Game Zone
Game Zone is the fourth machine in the “Advanced Exploitation” part of TryHackMe’s “Offensive pentesting” path. > Enumeration Nmap scan output: nmap -sC -sV -o gamezone <ip> 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.7 ( 80/tcp open http Apache httpd 2.4.18…
Dipping your toes into Digital Forensic just a bit. Analyzing the .pcap file to replicate attacker's action. This machine is different from others in this series, but it's worth checking.
#tryhackme #pentest
https://telegra.ph/Ovrpass2-09-23
#tryhackme #pentest
https://telegra.ph/Ovrpass2-09-23
Telegraph
Ovrpass2
Overpass2 is the seventh machine in the “Advanced Exploitation” part of TryHackMe’s “Offensive pentesting” path. > PCAP analysis That is an unusual type of machine for me. We got the .pcap file with the network dump. There are few ways to work with .pcap…
Hacking Skynet in this Terminator-themed machine. A LOT of enumeration with a pinch of brute forcing. Exploitation is straight forward, PrivEsc part will...take some time 😉
#tryhackme #pentest
https://telegra.ph/Skynet-09-23
#tryhackme #pentest
https://telegra.ph/Skynet-09-23
Telegraph
Skynet
Skynet is the fifth machine in the “Advanced Exploitation” part of TryHackMe’s “Offensive pentesting” path. > Enumeration Let’s start with the nmap scan: nmap -sC -sV -o nmap.txt <target_ip> 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 80/tcp open http…
The last writeup on
https://telegra.ph/Internal-09-23-2
Offensive Pentesting learning path from me. Kicking Wordpress and Jenkins instance in that one. https://telegra.ph/Internal-09-23-2
Telegraph
Internal
Internal is the last machine in the “Advanced Exploitation” part of TryHackMe’s “Offensive pentesting” path. Enumeration As I’m starting to prepare for my “Dry run” for the OSCP exam, this time I will use more stuff from my methodology. We already learned…