CTF Solutions
HacktheBox Machines
Skills
- Web Enumeration
- Service Enumeration
- Directory Enumeration
- XSS (Cross-Site Scripting) Cookie Stealing
- Command Injection
- Reverse Shell Setup
- Bash Script Injection (Privilege Escalation)
Skills
- Web Enumeration
- NFS Enumeration
- Abusing owners assigned to NFS shares by creating new users on the system (Get Access to Web Root)
- Creating a web shell to gain system access
- Abusing .Xauthority file (Pentesting X11)
- Taking a screenshot of another user's session
Skills
- Users Enumeration [Kerbrute]
- SMB Enumeration
- EXE Binary Analysis
- Network Traffic Analysis [Wireshark]
- DNSpy Static Analysis
- Password Decoding [Cyberchef]
- RPC Users Enumeration
- Ldap Enumeration (ldapsearch)
- Information Leakage
- Abusing Remote Management Users group (Evil-WinRM)
- SharpHound + BloodHound Enumeration
- Abusing Shared Support Accounts (GenericAll) (rbcd Attack) [Resource Based Constrained Delegation]
- Resource Based Constrained Delegation Attack - Creating a Computer Object (powermad.ps1)
- Resource Based Constrained Delegation Attack - Getting the impersonated service ticket (getST.py)
- Using the ticket to gain Administrator access [Privilege Escalation]
Skills
- DNS Enumeration
- Domain Zone Transfer Attack (AXFR)
- SQL Injection (SQLI)
- Local File Inclusion (LFI)
- Subdomain Discovery
- Abusing Sudoers Privilege (fail2ban command)
Skills
- Web Enumeration
- Abusing WebHook Setup
- Exploiting SSRF (Server Side Request Forgery) - Open redirect
- Gogs v0.5.5 Exploitation - SQL Injection [CVE-2014-8682]
- Creating a SQL injection that allows us to obtain the salt and password of a user
- Hash restructuring in order to crack it
- Password Cracking [Hashcat]
- SSRF (Server Side Request Forgery) + SQL Injection
- Abusing Cron Job (Database Manipulation) [Privilege Escalation]
Skills
- SMB Enumeration
- Follina Exploitation (CVE-2022-30190) + ConPtyShell TCP Shell [Remote Code Execution]
- SharpHound + BloodHound DC Enumeration
- Abusing AddKeyCredentialLink Privilege [Invoke-Whisker.ps1 - Shadow Credentials]
- Getting the user's NTLM Hash with Rubeus
- Abusing WinRM - EvilWinRM
- Abusing WSUS Administrators Group
- WSUS Exploitation - Creating a malicious patch for deployment [Privilege Escalation]
Skills
- Web Enumeration
- SQL Injection (SQLI)
- Information Leakage - Error Messages
- Login bypass - SQLI
- Abusing MPDF - Local File Inclusion (LFI)
- Abusing meta-git command - RCE via insecure command formatting
- Abusing gdb capabilitie (cap_sys_ptrace+ep) [Privilege Escalation]
Skills
- Web Enumeration
- Information Leakage
- Insecure Direct Object Reference (IDOR) in order to discover valid reports
- Abusing File Upload - Uploading a PHP file disguised as PDF + Obfuscated Web Shell (Weevely3)
- Abusing Internal Web Server - Port Forwarding [Chisel]
- Wordpress Brandfolder 3.0 Plugin Exploitation - Local/Remote File Inclusion (User Pivoting)
- Changing admin user password in wordpress via MYSQL (Wordpress Password Hash Generator)
- Virtual Box Image Enumeration
- Cracking VirtualBox Encryption (pyvboxdie-cracker)
- Creating a new virtual machine in VirtualBox and installing the extension pack
- Decrypting the VirtualBox VDI Image with VBoxManage
- Mounting the VirtualBox VDI Image (qemu-nbd)
- Cracking the LUKS v2 Password (bruteforce-luks-static-linux-amd64)
- Mounting the Luks Drive (cryptsetup)
- Finding a password among the mounted files
- Abusing sudoers privilege [Privilege Escalation]
Skills
- Web Enumeration
- Information Leakage (Default Credentials)
- Web Shell Exploiting File Upload Vulnerability
- Abusing Get-bADpasswords Misconfiguration To Get a Weak Hash
- Password Cracking [Hashcat]
- SMB Internal Enumeration
- User Pivoting (User Impersonation Via Web Shell)
- Process Enumeration
- DLL Hijacking (Get-bADpasswords dll)
- Finding PFX File (System Enumeration)
- Cracking PFX File (crackpkcs12)
- Script Hijacking (Malicious Powershell Script)
- Dumping Hashes Abusing Get-ADReplAccount [Privilege Scalation]
- Getting a Ticket as Administrator (Ticketer)
- Administrator Connection Via SMB-Client
HacktheBox Challenges
Skills
- The Skills Will Be Updated After The Challenge Release.
Skills
- The Skills Will Be Updated After The Challenge Release.
PortSwigger Academy
TryHackMe
![SVG Image](/images/index/thm.png)
Medium