- Touchpoint in HCL Connections 6.5CR1
- Some updates (some delayed) on Engage 2020, Connections, my job and documentation as code
- Asciidoctor open links in new window
- DNUG Connections Day 2020
- Walkthrough: Vulnhub - DC: 3
- Walkthrough: Vulnhub - DC: 2
- Walkthrough: Vulnhub - DC: 1
- Walkthrough: Vulnhub - Djinn:1
- Talks 2020
- Automate hugo
Table of Contents TL;DR Recon Attack Joomla SQLMAP Remote Shell Exploit and root flag The flag Final thoughts TL;DR Download and Informations Link to Vulnhub DC Challenges Original Description DC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing. As with the previous DC releases, this one is designed with beginners in mind, although this time around, there is only one flag, one entry point and no clues at all. Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools.
Table of Contents TL;DR Recon Create /etc/hosts entry Find open ports Wordpress wpscan Enumerate Users Generate wordlist Find matching passwords SSH Escape rbash Run external command in vi Root Shell with git Flags Flag 1 Flag 2 Flag 3 Flag 4 Final Flag Final thoughts TL;DR Download and Informations Link to Vulnhub DC Challenges Original Description Much like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing. As with the original DC-1, it’s designed with beginners in mind.
Table of Contents Recon Drupal Opening netcat shell Grab the flags through netcat shell and browser Flag1 Flag2 Flag3 Flag4 Final Flag Download and Informations Link to Vulnhub DC Challenges Original Description DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing. It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn. To successfully complete this challenge, you will require Linux skills, familiarity with the Linux command line and experience with basic penetration testing tools, such as the tools that can be found on Kali Linux, or Parrot Security OS.
Table of Contents Recon FTP Files content Port 1337 Solve with pwntools Solution SSH Port 7331 Remote shell Get user.txt flag Get root flag root.flag Links Downloads and Informations djinn:1 is the next machine I want to break in. Description on Vulnhub Level: Beginner-Intermediate flags: user.txt and root.txt Format: Virtual Machine (Virtualbox - OVA) Operating System: Linux The machine is VirtualBox as well as VMWare compatible. The DHCP will assign an IP automatically. You’ll see the IP right on the login screen.
Table of Contents Find IP addresses in your network Port Scan First curl Browser and Intercept Proxy Add "Copy curl command" Test SSH Login Login as alice Get root In my spare time I like doing CTF (Capture the flag) or solving machines posted at Vulnhub. This time I started Christmas vacation with Me and My Girlfriend: 1. Extracting and importing into Vmware Workstation was straight forward, after the start we need to find the ip address of the vulnerable machine. Find IP addresses in your network One way is to use netdiscover, but then you need to enable promiscious mode for the physical network adapter.