Hack the Box: Help Walkthrough

June 23, 2019

Help is a recently retired CTF challenge VM on Hack the Box and the objective remains the same– Capture the root flag. Hack the Box offers a wide range of VMs for practice from beginner to advanced level and it is great for penetration testers and researchers. Level: Intermediate Task: To find user.txt and root.txt file Note: Since these labs are online available, therefore, they have a static IP. The…

Read More >>

Linux for Pentester: Time Privilege Escalation

June 20, 2019

In this article, we’ll talk about Time command which is a Linux utility and learn how helpful the time command is for Linux penetration testing and how we’ll progress time to scale the greater privilege shell. Table of Contents All About Linux Time Command Major Operation Perform by Time Abusing Time Utility SUID Lab Setups for Privilege Escalation Privilege Escalation Sudo Lab Setups for Privilege Escalation Privilege Escalation All About…

Read More >>

Linux for Pentester: xxd Privilege Escalation

June 16, 2019

In this article, we are going to make our readers familiar with another influential command i.e. “xxd” which assist for converting any hex dump to a binary and vice-versa. So, by knowing this certainty now we will check how wisely we can make it applicable in Privilege Escalation. Table of Content Introduction to xxd Major Operation performed using xxd Exploiting xxd SUID Lab setups for Privilege Escalation Exploiting SUID Introduction…

Read More >>

Linux for Pentester: Find Privilege Escalation

June 14, 2019

Today in this article we are back with another most advantageous command from the series of Linux for Pentester i.e. “Find’. The Find command is used to search the list of files and directories, so by knowing this fact, we will now illustrate how we can avail it in Privilege Escalation. Table of Content Introduction to Find Major Operation performed using Find Exploiting Find Sudo Rights Lab setups for Privilege…

Read More >>

Cloakify-Factory: A Data Exfiltration Tool Uses Text-Based Steganography

June 12, 2019

In our previous post, we had already discussed on “Cloud Storage Uploads for data exfiltration” and today we are going to discussed “Concealed Method for Data Exfiltration” to extract the unauthorized data. Here you will learn how an intruder can exfiltrate data through steganography approach. Table of Content Overview About Data Exfiltration Cloakify Installation and Usages (for Linux) Method -I Method II Cloakify Installation and Usages (for Windows) Overview We…

Read More >>

Linux for Pentester: Wget Privilege Escalation

June 10, 2019

In this article, we are going to describe the entire utility of Wget command and how vital it is in Linux penetration testing. As Wget is used for downloading the files from the server so here we will learn that what else we can do by this command in Privilege Escalation. Table of Content Introduction to Wget Major Operation performed using Wget Exploiting Wget Sudo Rights Lab setups for Privilege…

Read More >>

DC-5 Vulnhub Walkthrough

June 1, 2019

Today we are going to take another boot2root challenge known as “DC-5”. The credit for making this VM machine goes to “DCAU” and it is another boot2root challenge in which our goal is to get root access to complete the challenge. You can download it from here. Security Level: Medium Penetration Methodology Scanning Discovering Targets IP Network scanning (Nmap) Enumeration Surfing HTTP service port Abusing CMS using LFI  Checking Ngnix…

Read More >>

digitalworld.local-BRAVERY: Vulnhub Walkthrough

May 25, 2019

Today we will be solving a boot2root lab from Vulnhub called SILKY-1. This lab, like many others, is a good way to keep your penetration testing skills sharp while getting some variety. Download it from here: //www.vulnhub.com/entry/digitalworldlocal-bravery,281/ Penetration Methodologies Scanning Netdiscover Nmap Enumeration Mount NFS share directory SMB shared file enumeration Exploiting Abusing CMS via RFI Obtaining reverse shell via netcat Privilege Escalation Abusing SUID binary Capture the Flag Walkthrough…

Read More >>

Sputnik 1: Vulnhub Walkthrough

May 19, 2019

Today we will be solving a boot2root lab from Vulnhub called Sputnick:1. This lab, like many others, is a good way to keep your penetration testing skills sharp while getting some variety. Level: Easy Task: To find flag.txt Table of Content Scanning  Open ports and Running services (Nmap) Enumeration  Web Directory search  Credential harvesting Exploitation  Splunk reverse and bind shell Python reverse shell Accessing shell Privilege Escalation Capture flag.txt Scanning…

Read More >>

Command & Control: Ares

April 16, 2019

In this article, we will learn how to use Ares tool. This tool performs the Command and Control over the Web Interface. This tool can be found on GitHub. Table of Content: Introduction Installation Exploiting Target Command Execution Capturing Screenshot File Download Compressing Files Persistence Agent Clean Up Introduction                                                                                                                                                  Ares is a Python Remote Access Tool. Ares is made of two main programs: A Command & Control server, which is…

Read More >>