executeatwill
executeatwill

Penetration Analysis & Security Research


  • Home

  • Archives

  • Tags

Stapler 1

Posted on 2019-02-23

Vulnhub virtual machine; another OSCP prep box. Which offered a wide scope of pentesting techniques to include Wordpress LFI with exploit modification to exclude SSL checking, MySQL RCE path that enabled the ability for a reverse shell and a custom find script that parsed .bash_history. Preparing for battle never felt so good.

Read more »

Kioptrix Level 1.3 4

Posted on 2019-02-21

Vulnhub virtual machine; On the path to OSCP this box offered enumeration of services with enum4linux and credential extraction via SQL-i. The main escalation occurs from within MySQL through manipulating the sys_exec function. This was a well rounded crafted box.

Read more »

Kioptrix Level 1.2 3

Posted on 2019-02-19

Vulnhub virtual machine; On the path to OSCP this box offered web-application testing with Metasploit, myphpadmin credentials enumeration. Cracking hashes with Hashcat an interesting Priv-Esc which included modifying the sudoer file.

Read more »

Kioptrix Level 1.1 2

Posted on 2019-02-18

Vulnhub virtual machine; On the path to OSCP this box offered SQL-injection for login and a client side web application that was able to be manipulated to give a foothold to box. Classic enumeration of box to compile a priv-esc.

Read more »

Kioptrix Level 1 1

Posted on 2019-02-16

Vulnhub virtual machine; On the path to OSCP this box offered Apache/OpenSSL vulnerability which led to a custom version of the exploit and an environmental problem and solution.

Read more »

Install Hashcat On Windows

Posted on 2019-02-11

This is a guide to installing hashcat on a windows 10 build. Hashcat allows for the use of GPUs to crack hashes which is significantly faster then within a VM and/or using a CPU alone.

Read more »
1 … 4 5
Will M.

Will M.

Pentester - Cybersecurity Fighter Pilot

46 posts
GitHub Twitter
© 2024 Will M.
Powered by Jekyll
Theme - NexT.Muse