Home
Lab icon
Hackthebox Tryhackme
Archives
My Projects icon
Pocketphish Stack Discovery
About
  • bounty

    Feb 17, 2021 TJNull's List

    Introduction: Recon eneloop@kinetic:…/hackthebox/bounty/data$ sudo nmap -sS -sV -T4 -O -oN nmap.bounty.txt 10.10.10.93 [sudo] password for eneloop: Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-17 19:46 EST Nmap scan report for 10.10.10.93 Host is up (0.014s latency). Not shown: 999 filtered ports PORT …

    Read More
  • Haircut

    Jan 7, 2021 TJNull's List webapp curl screen

    Introduction: Haircut is a very simple but great machine with a vulnerable app running that allows you to exploit curl to download a shell on the webserver and get the initial foothold. Recon NMAP scan 1nmap -sS -sV -sC -T4 -Pn -O -oN nmap.haircut.txt 10.10.10.24 2Host discovery disabled (-Pn). All addresses will be …

    Read More
  • Omni

    Jan 3, 2021 TJNull's List Windows Device Portal iot

    Introduction: Omni is probably named omni because there is too much going on with this machine as you can see from the initial scans. There are bunch of open ports and URLs discovered by scans that can lead you to rabit holes. If you do a good recon, you will realize that you are dealing with “Windows Device …

    Read More
  • Academy

    Jan 3, 2021 TJNull's List

    Introduction: Academy is a great machine with lots of rabbit holes and opportunities to learn. I spent a lot of time tinkering this one and looked for lot of hints for the priv-escalation. Recon NMAP scan 1# Nmap 7.91 scan initiated Sun Jan 3 09:00:32 2021 as: nmap -vv --reason -Pn -A --osscan-guess --version-all -p- …

    Read More
  • Mirai

    Jan 3, 2021 TJNull's List pi-hole raspberry-pi

    Introduction: Recon 1nmap -sS -sC -sV -T4 -O -oN nmap.mirai.txt 10.10.10.48 2Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-01 13:25 EST 3Nmap scan report for 10.10.10.48 4Host is up (0.015s latency). 5Not shown: 997 closed ports 6PORT STATE SERVICE VERSION 722/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u3 (protocol …

    Read More
  • Jerry

    Dec 31, 2020 TJNull's List Windows Tomcat

    Introduction: Jerry is a very easy machine where you can enumerate the tomcat webserver and upload a webshell to exploit the box. Recon 1 nmap -sS -sC -sV -T4 -O -oN nmap.jerry.txt 10.10.10.95 2Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-31 15:22 EST 3Nmap scan report for 10.10.10.95 4Host is up (0.013s …

    Read More
  • Grandpa

    Dec 31, 2020 TJNull's List Windows Metasploit

    Introduction: The “grandpa” is an easy windows machine with a CVE exploit using metasploit. Since the machine is very old, its also vulnerable to many other exploits that you can chose from for the privilege escalation at the end. The key takeaways for me were Based on the CVE you are exploiting, determine …

    Read More
  • Beep

    Dec 23, 2020 TJNull's List

    Introduction: Recon 1# nmap -sS -sV -sC -T4 -O -oN nmap.beep.txt 10.10.10.7 2Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-23 11:21 EST 3Nmap scan report for 10.10.10.7 4Host is up (0.014s latency). 5Not shown: 988 closed ports 6PORT STATE SERVICE VERSION 722/tcp open ssh OpenSSH 4.3 (protocol 2.0) 8| ssh-hostkey: …

    Read More
  • Devel

    Dec 23, 2020 TJNull's List Windows IIS Metasploit

    Introduction: This is a windows machine running IIS server, FTP service and presents few exploitable vulnerabilities. Its a very easy machine and I avoided using metasploit to work on this machine as I want to avoid/limit the usage as much as possible keeping the OSCP in mind. Recon Nmap output 1Nmap scan report for …

    Read More
  • Blue

    Dec 21, 2020 TJNull's List Metasploit Windows

    Introduction: Recon 1# nmap -sS -sV -sC -T4 -oN nmap.blue.txt 10.10.10.40 2Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-21 20:24 EST 3Nmap scan report for 10.10.10.40 4Host is up (0.015s latency). 5Not shown: 991 closed ports 6PORT STATE SERVICE VERSION 7135/tcp open msrpc Microsoft Windows RPC 8139/tcp open …

    Read More
    • ««
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • »
    • »»

wirem0nster

engineer, innovator, and a student for ever
Read More

Featured Posts

  • OSCP Notes - Work in progress
  • frolic
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Gatekeeper - Buffer Overflow
  • Online Resources for Pentesters
  • Relevant
  • Daily Bugle

Recent Posts

  • OSCP Notes - Work in progress
  • bountyhunter
  • schooled
  • bastion
  • tenet
  • jarvis
  • ready
  • swagshop

categories

HACKING 53 OSCP 47 PENTESTING 10 REVERSE-ENGINEERING 3 TECHNOLOGY 3 NOTES 1

tags

TJNULLS-LIST 40 WINDOWS 9 TIPS 5 LINUX 4 METASPLOIT 4 PRIVESC 4 BUFFER-OVERFLOW 3 CRACKING 3 IMMUNITY-DEBUGGER 3 MONA 3 SMB 3 FORENSICS 2 IIS 2 INDEX 2
All tags
BUFFER-OVERFLOW3 BURPSUITE1 CRACKING3 CTF1 CURL1 DOCKER1 DOCUMENTATION1 ENUMERATION1 FORENSICS2 HYDRA1 IIS2 IMMUNITY-DEBUGGER3 INDEX2 IOT1 JAVA1 JENKINS1 JOHN-THE-RIPPER1 LINUX4 METASPLOIT4 MONA3 MONGO2 NMAP1 NOSQL-INJECTION2 NOTES1 PENTESTING1 PHP-SERIALIZATION1 PHPMYADMIN1 PI-HOLE1 PRIVESC4 PYTHON-LIBRARY-HIJACK1 RASPBERRY-PI1 RELEASE-ARENA1 SCREEN1 SMB3 SQL-INJECTION1 SSH-PORT-FORWARD1 STEGANOGRAPHY1 SUID2 TIPS5 TJNULLS-LIST40 TOMCAT1 TOOLS2 TRICKS1 UNTAGGED1 WEBAPP1 WEBSHELL1 WINDOWS9 WINDOWS-DEVICE-PORTAL1 WINE1 WIRESHARK2 ZONE-TRANSFER1
[A~Z][0~9]

Copyright © 2021 WIREM0NSTER'S INFOSEC LOG. All Rights Reserved