Overview Pretty simple box. Learn about Drupal exploits, ssh brute force, and snap privilege escalation. Solution Recon Nmap FIrst nmap the target. Got port 22 and 80 open. Try SSH to the box. SSH banner reveals no useful information. Websiite Checkout the website. I tried to use single quote in the login form to test…
Category: Pentest
Cyber security and penetration test
Road to Pentest – INE Lab – Black Box 3
Lab Intro You have been engaged in a Black-box Penetration Test (172.16.37.0/24 range). Your goal is to read the flag file on each machine. On some of them, you will be required to exploit a remote code execution vulnerability in order to read the flag. Some machines are exploitable instantly but some might require exploiting…
Road to Pentester – INE Lab – Black Box 2
Lab Intro You have been engaged in a Black-box Penetration Test (172.16.64.0/24 range). Your goal is to read the flag file on each machine. On some of them, you will be required to exploit a remote code execution vulnerability in order to read the flag. Some machines are exploitable instantly but some might require exploiting…
Road to Pentester – INE Lab – Black Box 1
Lab Intro You have been engaged in a Black-box Penetration Test (172.16.64.0/24 range). Your goal is to read the flag file on each machine. On some of them, you will be required to exploit a remote code execution vulnerability in order to read the flag. Some machines are exploitable instantly but some might require exploiting…
Road to Pentester – INE Lab – Metasploit
Lab Intro In this lab, you will have to use Metasploit and meterpreter against a real machine; this will help you become familiar with the Metasploit framework and its features. Solution I’m now in a 192.168.99.0/24 network. One host is alive. Finger-print the host with nmap. nmap -sC -sV -v 192.168.99.12 A lot of results….
Road to Pentester – INE Lab – ARP Poisoning
Lab Intro In this lab you are connected to a switched network. Try to intercept network traffic and steal telnet credentials by performing an ARP poisoning attack. Identify the telnet server and the client machine Intercept traffic between the two Analyze the traffic and steal valid credentials Login into the telnet server Solution I’m in…
Road to Pentester – INE Lab – Null Session
Lab Intro In this lab you can practice different techniques and tools against a machine vulnerable to null session! The final goal of the lab is retrieve information from the target machine such as shares, users, groups and so on! Moreover by navigating the remote machine, you should be able to find a file name…
Road to Pentester – INE Lab – Brute Forcing
Lab Intro The lab is divided in two main parts: Network authentication cracking Bruteforce and password cracking In the first part of the lab you will have to use different network authentication cracking techniques and tools against services available on the target machine. Once valid credentials have been found, it is time to download the…
Road to Pentester – INE Lab – Sql Injection
Lab Intro In this lab you can practice the SQL Injection techniques and tools studied during the course. You can access the target web application at the following address 10.124.211.96. The goal of this lab is to test the web application in order to find all the vulnerable injection points. Once you find them, you…
VIM Privilege Escalation with Server Client Mode
Background Recently, I’ve developed this work flow which involves using the server client mode of vim. For further information about server client mode of vim, there’re tons of articles about that. The main problem is that, if I run vim server with non-root user, I cannot edit system files which belong to root. To solve…