Recently Updated Pages

Templed

Download and unzip  challenge with pass : hackthebox   Heading over to the website and insp...

vmdk => qcow2

Convert Kali Linux VMDK to KVM Install image here Verify checksum Install KVM sudo ...

Environment

Create a systemd service file to connect  application to gunicorn socket and another file to hold...

Configuring Settings

Change project name and other particular settings as needed, this is just a bare bones template. ...

New Page

[email protected]:~$ nmap -p- -A -sC -sV 10.10.10.215Starting Nmap 7.91 ( https://nmap.org ) at 20...

Notes

# Nmap 7.91 scan initiated Sat Nov 21 18:33:55 2020 as: nmap -p- -A -v -oA doctor 10.10.10.209# P...

Notes

  Starting Nmap 7.91 ( https://nmap.org ) at 2020-11-15 01:48 MSTNmap scan report for 10.10.10.2...

Notes

nmap -p- -A -T4 10.10.10.37Starting Nmap 7.91 ( https://nmap.org ) at 2020-11-14 23:28 MSTNmap sc...

Raw Write-up

$ nmap -p- -T4 10.10.10.29Starting Nmap 7.91 ( https://nmap.org ) at 2020-11-12 13:30 MSTNmap sca...

What I did

Followed Writeup   $ nmap -p- -T4 10.10.10.7 Starting Nmap 7.91 ( https://nmap.org ) at 2020-11...

Going Deeper & Bypassing Authentication

Heading over to the website and inspecting the source, we see a custom js file at the very bottom...

Connect & Digging In

  Starting off with a typical htb nmap scan: nmap -AT4 -Pn -p- -v -oN Jet 10.13.37.10 We can s...

Obtaining User Access

nmap Starting off with a typical htb nmap scan: nmap -AT4 -Pn -p- -v -oN Traceback 10.10.10.1...

Privilege Escalation

Starting off with a typical htb nmap scan: nmap -AT4 -Pn -p- -v -oN Traceback 10.10.10.181 We...

Cracking password and owning user

With success, we get a password s3rvice for user svc-alfresco   Since we also saw earlier, ...

Impacket - Get Users from Active Directory

So far we have received enough information to start forming an attack.We will try to perform kerb...

Enum4Linux

What is Enum4Linux? A Linux alternative to enum.exe for enumerating data from Windows and Samba ...

Initial Enumeration

Starting off with a typical super intrusive nmap scan,nmap -T5 -APn -o Forest -p- 10.10.10.161 W...

Exploiting Poor Configuration

Exploiting this will be pretty straight forward. Knowing we have a short window (30 seconds) to ...

Exploring the System as User

To get root, we will need a proper user shell. Taking the lua exploit we used to print the user f...