Hacking For Ramen
308 subscribers
24 photos
2 videos
1 file
62 links
Journey from Zero to Hero.
Pentest, RE, ExploitDev, Malware Analysis.
Chat: https://t.iss.one/+43eHuXah_ZxjODBi
Download Telegram
Hello username.
welcome to this channel about different aspects of hacking. It’s planned to be a personal blog to share different writeups and resources, that might comes handy in your journey of penetration testing, exploit development, or bug bounty hunting.
Hack the planet!
The list itself, in case if you don't know what I'm referring to. This is probably the best resource on your journey to become an #OSCP holder. There are both, #vulnhub and #hackthebox machines with different levels of difficulty. Bonus points for those who can actually figure out why each machine is listed there 😉
https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8
A bunch of next writeups will be for Offensive Pentesting learning path from #tryhackme. You can learn more about it here: https://tryhackme.com/path/outline/pentesting.
It's also a nice way to prepare yourself for the #OSCP exam, so I noted down almost all writeups for it as well.
Enjoy!
The Vulnversity will be the first machine in this series. It's a pretty classic exploitation path for the web server with further privilege escalation process via abusing the SUID bit on one of the binaries. For all machines in this series I put takeaways at the end of the writeup.

#tryhackme #pentest
https://telegra.ph/Vulnversity-09-22
Kenobi is the third machine in TryHackMe’s Offensive pentesting path. Identifying and exploiting the vulnerability in FTP server. To escalate privileges to root you will need to use the combination of SUID binary and PATH variable.

#pentest #tryhackme
https://telegra.ph/Kenobi-09-22
Found my old HackTheBox writeup, that is also can be useful for OSCP prep. In Tabby, you need to break into the Tomcat instance and escape from the LXD container for a PrivEsc. Pretty cool machine, this PrivEsc vector is quite common, but still underrepresented in the majority of labs.

#hackthebox #pentest
https://telegra.ph/Tabby-09-27
To the hardcore part. While we are still on the OSCP note, it is wort mentioning the crucial part of the exam - the Buffer Overflow exploitation. That machine will give you 25 points (from 70 to pass the exam), and it is very different from all other machines. To handle that one, you will need to have some basic experience with Binary Exploitation and Exploit Development, as you will need to develop an exploit, that by manipulating of the program's input and memory, could execute arbitrary code to spawn a shell.
Without further ado, let's gain you some experience:
https://telegra.ph/Buffer-Overflow-101-09-27

#exploitdev #binaryexploitation #oscp