Hacking For Ramen
308 subscribers
24 photos
2 videos
1 file
62 links
Journey from Zero to Hero.
Pentest, RE, ExploitDev, Malware Analysis.
Chat: https://t.iss.one/+43eHuXah_ZxjODBi
Download Telegram
The list itself, in case if you don't know what I'm referring to. This is probably the best resource on your journey to become an #OSCP holder. There are both, #vulnhub and #hackthebox machines with different levels of difficulty. Bonus points for those who can actually figure out why each machine is listed there 😉
https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8
A bunch of next writeups will be for Offensive Pentesting learning path from #tryhackme. You can learn more about it here: https://tryhackme.com/path/outline/pentesting.
It's also a nice way to prepare yourself for the #OSCP exam, so I noted down almost all writeups for it as well.
Enjoy!
The Vulnversity will be the first machine in this series. It's a pretty classic exploitation path for the web server with further privilege escalation process via abusing the SUID bit on one of the binaries. For all machines in this series I put takeaways at the end of the writeup.

#tryhackme #pentest
https://telegra.ph/Vulnversity-09-22
Kenobi is the third machine in TryHackMe’s Offensive pentesting path. Identifying and exploiting the vulnerability in FTP server. To escalate privileges to root you will need to use the combination of SUID binary and PATH variable.

#pentest #tryhackme
https://telegra.ph/Kenobi-09-22
Found my old HackTheBox writeup, that is also can be useful for OSCP prep. In Tabby, you need to break into the Tomcat instance and escape from the LXD container for a PrivEsc. Pretty cool machine, this PrivEsc vector is quite common, but still underrepresented in the majority of labs.

#hackthebox #pentest
https://telegra.ph/Tabby-09-27
To the hardcore part. While we are still on the OSCP note, it is wort mentioning the crucial part of the exam - the Buffer Overflow exploitation. That machine will give you 25 points (from 70 to pass the exam), and it is very different from all other machines. To handle that one, you will need to have some basic experience with Binary Exploitation and Exploit Development, as you will need to develop an exploit, that by manipulating of the program's input and memory, could execute arbitrary code to spawn a shell.
Without further ado, let's gain you some experience:
https://telegra.ph/Buffer-Overflow-101-09-27

#exploitdev #binaryexploitation #oscp
My eWPT review is almost done, but it's make no sense to post it, as I'm still waiting for the result to arrive.
Oh well...
I will continue with the start of another series and interrupt it with the review later on. Stay tuned.
Spoiler: eWPT is nice
A bunch of upcoming post will be all about wargames from https://exploit.education/, formerly known as exploit-exercises.com.
It's a great collection of virtual machines that could help to develop essential skills for vulnerability research, and exploit development.
It might seem too simple at the beginning, but the learning curve will smash me shortly, no doubt in that.