hackthebox.eu: Blunder Walkthrough
Returning to HTB with an easy Linux machine challenge focusing on a web application and some recon techniques. A good exercise that can test your process and give some good repetition on stepping through a test.
Making the DEF CON Safe Mode “badge” a badge
The DEF CON Safe Mode badge, lanyard, and challenge were awesome as usual this year, but I felt that the badge was missing a piece. This is my project to fill the void.
hackthebox.eu: Sauna Walkthrough
This was a fun Windows box with some web enumeration, SMB abuse, and a lot of Impacket practice for me.
— SPOILERS FOLLOW —
hackthebox.eu: OpenAdmin Walkthrough
A new easy Linux box with some new to me issues and an old privilege escalation to root. It was a fun one and reminded me of a few things that I ought to remember more quickly. It’s good to get a reminder of the basics sometimes.
SPOILERS AHEAD
hackthebox.eu: Traverxec Walkthrough
This was a fun “easy” Linux machine with some challenging enumeration, opportunities for cool new tools, and an old technique to gain a root shell done in a new way. I learned on this one that a step by step process is a good way to slow down if you’re not getting a result. When I took it a step at a time I had more success.
SPOILERS AHEAD
hackthebox.eu: Forest Walkthrough
Forest… an ‘easy’ Windows host with some Kerberos issues, an interesting WinRM path, and overly permissive DACL permissions. This one had some real challenges for me and the final step to root was a technique that I’ve not had hands-on with before. A great learning experience for sure!
SPOILERS AHEAD
hackthebox.eu: Postman Walkthrough
The Postman machine is a good example of a Redis cli vulnerability that leads to web dashboard access and a Webmin vulnerability. There are a couple of tricky spots in this machine and attention to detail is important to get through those spots. However there are very helpful blogs out there that can lead you through the process.
SPOILERS AHEAD
hackthebox.eu: Bitlab Walkthrough
Time for more hackthebox.eu machines. Bitlab is a medium Linux box running a version of Gitlab with some issues. Enumeration and looking at code was a factor in this box as well as some eventual basic reverse engineering of a Windows executable. This box pushed me out of my comfort zone in a lot of ways and was VERY satisfying when I finally got it.
hackthebox.eu: Wall Walkthrough
Back to the Wall with hackthebox.eu! This box was an interesting Linux box with some web app testing skills, some exploit code review and troubleshooting, and finally some Linux enumeration and exploit code moving for a comprehensive box. This was a challenge for sure and reminded me that I still have things to learn.
As always… spoilers ahead
hackthebox.eu: Heist Walkthrough
This is a fun and basic Windows box that provides a good opportunity to practice checking usernames and passwords as you go in addition to learning some cool new techniques using Windows sysinternals, Ruby, and BitsAdmin.
SPOILERS AFTER HERE
Hacker #000 Friday
An idea from @oscaron and @CyberWarship posted on twitter made me think that I’d like to take on the project of collecting all of the Black Friday deals that could be interesting for readers of this blog. If you see anything out there that should be on here, feel free to @ me on twitter (@webyeti) and I’ll look at adding it to this list.
Building a Pwnagotchi - Pwning wifi with AI
I’ve been watching the Pwnagotchi project by evilsocket for a while on twitter, so when I saw him post that an alpha version of his software was now available on Github I thought it was high time for a break from HTB. This post covers my notes and issues from getting an initial version working. For now it’s basics, but I’ll add my experiences with downloading a case and 3d printing it when I get a chance.
hackthebox.eu: SwagShop Walkthrough
This machine on Hack the Box was really fun. I have to admit I’m a lot more motivated when I have something I really want (like access to stickers) at the end. :)
HERE BE SPOILERS - YE BE WARNED
hackthebox.eu: Luke Walkthrough
My first medium level box. Hack the Box Luke. This one was fun, but honestly I feel like some of the ‘easy’ boxes had more steps. There was some discussion on the forums as well, but these things are pretty subjective. One hacker’s medium… blah blah blah.
SPOILERS INSIDE
hackthebox.eu: Bastion Walkthrough
Windows networks are more my wheelhouse, just since I see mostly active directory during penetration tests. This was an interesting box with some good SMB issues and opportunities for learning on my part. There was also an interesting backup image network mount technique in here that I hope to use in the future.
SPOILERS AHEAD
hackthebox.eu: Netmon Walkthrough
I’m really starting to like these Hack the Box machines! It’s good practice to have something you don’t know the exploit vector for and that you have to dig and research and figure out how it works before you get success. I’m also hoping that these notes can serve as a resource for techniques for me later. A “didn’t I do this before on htb?” kind of thing. You’d be surprised how often that happens in my day job.
SPOILERS AFTER HERE - as usual
hackthebox.eu: Irked Walkthrough
Time for another Hack the Box challenge! This time we’ll be taking on “Irked”. Hopefully that’s not foreshadowing and I’ll learn new techniques and tools again in another box.
SPOILERS ABOUND - YOU HAVE BEEN WARNED
hackthebox.eu: Jerry Walkthrough
My first Hack the Box challenge! Taking on “Jerry”, mainly because I thought I knew what technology may be in play here based on the name and I felt that a nice easy on-ramp to these challenges would be a good place to start. I’m a big believer in momentum when it comes to hacking and thought processes so I like to engineer some early wins.
BIG SPOILERS IN THIS POST - YOU HAVE BEEN WARNED