Hack the Box: Sense

I ran NMAP. nmap -vv -Pn -sS -A -sC -p- -T 3 -script-args=unsafe=1 -oA detailed_scan -n 10.10.10.60 Nmap scan report for 10.10.10.60 Host is up, received user-set (0.27s latency). Scanned at 2018-02-16 00:33:19 EST for 756s Not shown: 65533 filtered ports Reason: 65533 no-responses PORT STATE SERVICE REASON VERSION 80/tcp open http syn-ack ttl 63 … Continue reading “Hack the Box: Sense”

RDP Session Hijacking using tscon

I read Kevin Beaumont’s RDP Session Hijacking article in Medium and was amazed on how it worked so I decided to replicate it. For more information about the RDP Hijacking please check Kevin Beaumont article (https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6).   The Setup: 2 virtual machines both running in Windows 7 Attacker Machine Target Machine   In this situation, … Continue reading “RDP Session Hijacking using tscon”

Hack the Box: Node

I ran NMAP. nmap -vv -Pn -sS -A -sC -p- -T 3 -script-args=unsafe=1 -oA detailed_scan -n 10.10.10.58   Starting Nmap 7.60 ( https://nmap.org ) at 2018-02-17 02:20 EST Nmap scan report for 10.10.10.58 Host is up, received user-set (0.28s latency). Scanned at 2018-02-17 02:20:14 EST for 791s Not shown: 65533 filtered ports Reason: 65533 no-responses … Continue reading “Hack the Box: Node”

Hack The Box: Shocker

Enumeration I ran NMAP nmap -vv -Pn -sS -A -sC -p- -T 3 -script-args=unsafe=1 -n 10.10.10.56 Nmap scan report for 10.10.10.56 Host is up, received user-set (0.24s latency). Scanned at 2018-02-11 19:02:27 EST for 1183s Not shown: 65392 closed ports, 141 filtered ports Reason: 65392 resets and 141 no-responses PORT STATE SERVICE REASON VERSION 80/tcp … Continue reading “Hack The Box: Shocker”

LazySysaAmin: 1 – Walkthrough

Machine Information Name: LazySysaAmin: 1 Date release: 20 Sep 2017 Author: Togie Mcdogie (Twitter: @TogieMcdogie) Difficulty: Beginner – Intermediate Description: Boot2root created out of frustration from failing my first OSCP exam attempt. Download: https://www.vulnhub.com/entry/lazysysaamin-1,205/ Enumeration I ran netdiscover to find the IP of the vulnerable box. netdiscover -i eth0  I got the results 192.168.226.132 then … Continue reading “LazySysaAmin: 1 – Walkthrough”

Preparing for PWK/OSCP

This is how I prepare for the PWK (Pentesting with Kali). I allotted 2 months of researching, focusing on my weak points, joining CTF, rooting some boxes in Vulnhub.com, and asking people who took the course for more information and what to expect. I focused on Privilege Escalation and Scripting (bash, powershell, C and Python). During … Continue reading “Preparing for PWK/OSCP”

Kioptrix: Level 3

I have 18 more days to prepare for OSCP. Enumeration I ran netdiscover to find the IP of the vulnerable box. netdiscover -i eth0  I got the results 192.168.33.135 then ran a nmap scan. nmap -p- -sV -sS -T4 -A -oX Kioptrixlvl3.xml 192.168.33.135 Starting Nmap 7.25BETA2 ( https://nmap.org ) at 2017-05-18 18:53 EDT Nmap scan report … Continue reading “Kioptrix: Level 3”

Kioptrix: Level 2

I have 24 more days to prepare for OSCP. Enumeration I ran netdiscover to find the IP of the vulnerable box. netdiscover -i eth0   I ran NMAP to check for open ports and running services. nmap -p- -sV -sS -T4 -A -oX Kioptrixlvl2.xml 192.168.33.134 Starting Nmap 7.25BETA2 ( https://nmap.org ) at 2017-05-17 06:53 EDT Stats: 0:00:31 elapsed; … Continue reading “Kioptrix: Level 2”

Kioptrix Level 1

I have 26 more days to prepare for OSCP. Enumeration  I used netdiscover to find the IP of the vulnerable box. netdiscover -i eth0 After getting the IP I ran NMAP to check the open ports and running services. nmap -p- -sV -sS -T4 -A -oX Kioptrixlvl1.xml 192.168.33.133 Starting Nmap 7.25BETA2 ( https://nmap.org ) at 2017-05-16 06:57 … Continue reading “Kioptrix Level 1”

Volga 2017 Quals – VC

The VC task is under the category Crypto. VC There are files A.png and B.png. But where’s the flag? A.png B.png Solution: First, create two layers in Adobe photoshop or whatever image editor you have. On the first layer (layer 0), insert the image A.png and B.png on the second layer (layer 1). Second, set … Continue reading “Volga 2017 Quals – VC”