Home
Lab icon
Hackthebox Tryhackme
Archives
My Projects icon
Pocketphish Stack Discovery
About
  • Grandpa

    Dec 31, 2020 TJNull's List Windows Metasploit

    Introduction: The “grandpa” is an easy windows machine with a CVE exploit using metasploit. Since the machine is very old, its also vulnerable to many other exploits that you can chose from for the privilege escalation at the end. The key takeaways for me were Based on the CVE you are exploiting, determine …

    Read More
  • Devel

    Dec 23, 2020 TJNull's List Windows IIS Metasploit

    Introduction: This is a windows machine running IIS server, FTP service and presents few exploitable vulnerabilities. Its a very easy machine and I avoided using metasploit to work on this machine as I want to avoid/limit the usage as much as possible keeping the OSCP in mind. Recon Nmap output 1Nmap scan report for …

    Read More
  • Blue

    Dec 21, 2020 TJNull's List Metasploit Windows

    Introduction: Recon 1# nmap -sS -sV -sC -T4 -oN nmap.blue.txt 10.10.10.40 2Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-21 20:24 EST 3Nmap scan report for 10.10.10.40 4Host is up (0.015s latency). 5Not shown: 991 closed ports 6PORT STATE SERVICE VERSION 7135/tcp open msrpc Microsoft Windows RPC 8139/tcp open …

    Read More
  • Granny

    Dec 10, 2020 TJNull's List Metasploit Windows

    Introduction: The “granny” is a windows box and very similar to the “grandpa” box in terms of the exploits and privesc. You will be exploiting an IIS CVE to gain initial access to the machine, then migrate your process and use one of the many possible exploits to do a privilege escalation. Recon …

    Read More

wirem0nster

engineer, innovator, and a student for ever
Read More

Featured Posts

  • OSCP Notes - Work in progress
  • frolic
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Gatekeeper - Buffer Overflow
  • Online Resources for Pentesters
  • Relevant
  • Daily Bugle

Recent Posts

  • OSCP Notes - Work in progress
  • bountyhunter
  • schooled
  • bastion
  • tenet
  • jarvis
  • ready
  • swagshop

categories

HACKING 53 OSCP 47 PENTESTING 10 REVERSE-ENGINEERING 3 TECHNOLOGY 3 NOTES 1

tags

TJNULLS-LIST 40 WINDOWS 9 TIPS 5 LINUX 4 METASPLOIT 4 PRIVESC 4 BUFFER-OVERFLOW 3 CRACKING 3 IMMUNITY-DEBUGGER 3 MONA 3 SMB 3 FORENSICS 2 IIS 2 INDEX 2
All tags
BUFFER-OVERFLOW3 BURPSUITE1 CRACKING3 CTF1 CURL1 DOCKER1 DOCUMENTATION1 ENUMERATION1 FORENSICS2 HYDRA1 IIS2 IMMUNITY-DEBUGGER3 INDEX2 IOT1 JAVA1 JENKINS1 JOHN-THE-RIPPER1 LINUX4 METASPLOIT4 MONA3 MONGO2 NMAP1 NOSQL-INJECTION2 NOTES1 PENTESTING1 PHP-SERIALIZATION1 PHPMYADMIN1 PI-HOLE1 PRIVESC4 PYTHON-LIBRARY-HIJACK1 RASPBERRY-PI1 RELEASE-ARENA1 SCREEN1 SMB3 SQL-INJECTION1 SSH-PORT-FORWARD1 STEGANOGRAPHY1 SUID2 TIPS5 TJNULLS-LIST40 TOMCAT1 TOOLS2 TRICKS1 UNTAGGED1 WEBAPP1 WEBSHELL1 WINDOWS9 WINDOWS-DEVICE-PORTAL1 WINE1 WIRESHARK2 ZONE-TRANSFER1
[A~Z][0~9]

Copyright © 2021 WIREM0NSTER'S INFOSEC LOG. All Rights Reserved