Build - Vulnlab
Build is an easy difficulty machine, Where I had to get credentials from a backup file, access the internal network and add new records in order to bypass the docker container.
EnumerationThe Nmap scan shows the following ports.nmap -p- --min-rate=10000 10.10.67.89
nmap -sC -sV -p21,23,80 10.10.67.89 -oA ./nmap/Build
|Ports|Service|22| ssh OpenSSH 8.9p1 Ubuntu|53| Domain PowerDNS|512| exec|513| login|514| shell Netkit rshd|873| rsync|3000| ppp?|3306| mysql|8081| blackice-icecap
Default creds ...
Escape - HackTheBox
Escape is a medium difficulty Windows Active Directory machine that starts with an SMB share that guest authenticated users can download a sensitive PDF file. Inside the PDF file temporary credentials are available for accessing an MSSQL service running on the machine. An attacker is able to force the MSSQL service to authenticate to his machine and capture the hash. It turns out that the service is running under a user account and the hash is crackable. Having a valid set of credentials an att ...
Jeeves - HackTheBox
Jeeves is not overly complicated, however, it focuses on some interesting techniques and provides a great learning experience. As the use of alternate data streams is not very common, some users may have a hard time locating the correct escalation path.
EnumerationFirst I check for available open ports.
nmap -p- --min-rate=10000 10.10.10.63
nmap -sC -sV -p80,135,445,50000 10.10.10.63 -oA ./nmap/jeeves -Pn
Ports
Service
80
msrpc Microsoft IIS httpd 10.0
135
msrpc Microsoft Windows RPC
...
Remote - HackTheBox
Remote is an easy difficulty Windows machine that features an Umbraco CMS installation. Credentials are found in a world-readable NFS share. Using these, an authenticated Umbraco CMS exploit is leveraged to gain a foothold. A vulnerable TeamViewer version is identified, from which we can gain a password. This password has been reused with the local administrator account. Using psexec with these credentials returns a SYSTEM shell.
EnumerationFirst I check for available open ports.
nmap -p- --mi ...
Access - HackTheBox
Access is an easy difficulty machine, that highlights how machines associated with the physical security of an environment may not themselves be secure. Also highlighted is how accessible FTP/file shares can often lead to getting a foothold or lateral movement. It teaches techniques for identifying and exploiting saved credentials.
EnumerationFirst I check for available open ports.
nmap -p- --min-rate=10000 10.10.10.98
nmap -sC -sV -p21,23,80 10.10.10.98 -oA ./nmap/access
Ports
Service ...
Bastion - HackTheBox
Bastion is an easy level WIndows box which contains a VHD ( Virtual Hard Disk ) image from which credentials can be extracted. After logging in, the software MRemoteNG is found to be installed which stores passwords insecurely, and from which credentials can be extracted.
EnumerationFirst I check for available open ports.
nmap -p- --min-rate=10000 10.10.10.134
nmap -sC -sV -p21,22,80,135,139,445,5985,39517 10.10.10.134 -oA ./nmap/bastion.txt
Ports
Service
22
ssh OpenSSH for_Windows_7.9 ...
vsCTF 2023
We participated in our vsCTF 2023 and we ended up being 1st! It was a day-long CTF but we solved 24 (out of 31) challenges. Some of the challenges were very interesting.
Cant wait to play the next vsCTF event as CyberSpace
WebChallenge → Sanity CheckDescription → you know what to do.
Solution →
We are presented with a website that pretty much running nothing. I tried opening the source code by right click and Ctrl+u. None of them worked
We can view the source code by directly manupulating ...
Cronos - HackTheBox
Cronos is a medium Linux machine that focuses mainly on different vectors for enumeration and also emphasises the risks associated with adding world-writable files to the root crontab. This machine also includes an introductory-level SQL injection vulnerability
EnumerationFirst I check for available open ports.
nmap -sC -sV -A -oG beep beep.htb
Ports
Service
22
ssh OpenSSH 7.2p2 (4Ubuntu2.1)
53
DNS
80
Apache httpd 2.4.18
Next, I did directory brute-forcing but nothing interesting s ...
JWT Lab - Portswigger
All Labs of JWT from Portswigger.
ApprenticeJWT authentication bypass via unverified signatureLet’s login with the given credentials and intercept the request.
Our Extension can automatically detect JSON tokens. Let’s change the user to administrator.
After forwarding the request we can see the username is changed.
Now let’s repeat the process and each time the username needs to be changed.
NOTE → If you don’t want to change your username every time, after intercepting the request se ...
Beep - HackTheBox
Beep has a very large list of running services, which can make it a bit challenging to find the correct entry method. This machine can be overwhelming for some as there are many potential attack vectors. Luckily, there are several methods available for gaining access.
FixesDue to this machine’s age and the outdated TLS version, issues emerge.Before we move on, let’s solve a couple of them.
Firefox
Curl & gobuster-k, –insecure Allow insecure server connections
EnumerationI begin as ...