✒️
Pentesting Cheatsheet
  • Introduction
  • Basics
  • Information Gathering | OSINT
  • Penetration Testing
    • Scanning and Enumeration
    • HTTP and HTTPS
    • SMB | Windows Domain Enumeration
    • NFS
    • SMTP
    • Reverse Shells
    • Buffer Overflow | Buf Exploitation
    • Linux Privilege Escalation
    • Miscellaneous
    • Redis
  • Active Directory
    • AD Extras
    • Attack Vectors
    • Post Compromise Enumeration
    • Post Compromise Attacks
  • Pivoting
  • Windows Privesc
    • Window Tools/Resources
    • Meterpreter Privesc
    • Powershell Scripting
  • Vulnhub/ PG/ THM/ HTB
  • Apache Log4j
  • Linux Forensics Cheatsheet
Powered by GitBook
On this page
  • Infosec Prep
  • FunBoxEasy
  • Dawn
  • Machine Categories
  • Important Machines Writeups

Was this helpful?

Vulnhub/ PG/ THM/ HTB

Quick Writeups for Vulnhub/ PG Machines/ THM/ HTB

PreviousPowershell ScriptingNextApache Log4j

Last updated 2 years ago

Was this helpful?

Infosec Prep

USER User : OSCP User-Agent: * Disallow: /secret.txt In robots.txt, we get base64 encoded Private SSH Key. ssh oscp@IP_ADDRESS -i id_rsa

ROOT SUID bash binary /bin/bash -p Unintended Methods:

FunBoxEasy

USER : Dirbuster -> Login with admin:admin, edit image and upload PHP reverse shell. SSH with password.txt ROOT : sudo time /bin/bash

Dawn

USER : smbclient //192.168.178.11/ITDEPT Management.log in :80/logs shows web-control running as root. uploaded python shell in smb ITDEPT share with name 'web-control' Got reverse shell with cron. ROOT : checking for SUID BITS, found /usr/bin/zsh -> euid=0

Machine Categories

SSTI

HTB - Late (Image to Text Application built with Flask)

Important Machines Writeups

Execute sandboxed Lua scripts through the “EVAL” command using dofile(), Capturing NTLM hash via responder by connecting with //tun0-ip//share, Powerview and sharpHound, BloodHound for enumeration and Abusing GPO Permission via SharpGPOAbuse.exe

Enumerating subdomains and finding CMS "typo3", backend api call for SQLi, password cracking to get in typo3 panel, uploaded reverse shell, cracked user mozilla history to find credentials, getcap to find openssl binary to read and replace passwd file to get root.

https://falconspy.medium.com/infosec-prep-oscp-vulnhubwalkthrough-a09519236025
http://192.168.74.111/store/admin.php
VulnNet: Active [THM]CTF Write-ups
TryHackMe | VulnNet: EndgameTryHackMe
Logo
Logo