Category: Persecure
-
Vegeta: 1
https://www.vulnhub.com/entry/vegeta-1,501/ Review Enumeration uncovers hidden directories Check all the way to the bottom for clues Decode file and look out for double encoding Use a more through enumeration if stuck Decode a morse code to find for clues Check bash_histroy to find for clues Enumeration Run nmap scan to find for open ports. Run a…
-
Infosec Prep: OSCP
This machine was created for the InfoSec Prep Discord Server
-
HTB : Armageddon
https://app.hackthebox.com/machines/Armageddon Review Find service version through enumeration Metasploit exploit will give a web shell Databases credentials are stored openly Use mysqldump to dump password hashes Cracked hashes gives password for SSH login Able to run snap install without root Utilize dirty sock exploit to create an account and switch to root user without password Enumeration…
-
Practical Malware Analysis : Lab 1-3
Tools used: VirusTotal.com PEview PEiD Dependency Walker Malcode Analyst Pack Questions 1. Upload the Lab01-03.exe file to http://www.VirusTotal.com/. Does it match any existing antivirus definitions? 2. Are there any indications that this file is packed or obfuscated? If so, what are these indicators? If the file is packed, unpack it if possible. The file is…
-
HTB : Nibbles
https://app.hackthebox.com/machines/Nibbles Review Directory enumeration revels hidden information Login page credentials are simple RCE can be done from plugins Privilege execution can be achieved by editing a monitor script Enumeration Run nmap scan to find for open ports. Port 80 View source gives a clue. Run a gobuster scan to find for hidden directories. Main site…
-
Practical Malware Analysis : Lab 1-2
Tools used: VirusTotal.com PEview PEiD UPX Dependency Walker Malcode Analyst Pack Questions 1. Upload the Lab01-02.exe file to http://www.VirusTotal.com/. Does it match any existing antivirus definitions? 2. Are there any indications that this file is packed or obfuscated? If so, what are these indicators? If the file is packed, unpack it if possible. The file…
-
Practical Malware Analysis : Lab 1-1
Tools used: VirusTotal.com PEview PEiD Dependency Walker Malcode Analyst Pack Questions Upload the files to http://www.VirusTotal.com/ and view the reports. Does either file match any existing antivirus signatures? 2. When were these files compiled? PEview 3. Are there any indications that either of these files is packed or obfuscated? If so, what are these indicators?…
-
API Testing Lab setup
Tools Burpsuite Postman mitmproxy2swagger Git Docker Go JWT Kiterunner Arjun Zaproxy Burpsuite Download jython Install Autorize in Burpsuite extender Postman Download postman sudo tar -xvzf postman-linux-x64.tar.gz -C /opt Create a postman account cd /opt mitmproxy2swagger sudo pip3 install mitmproxy2swagger Git sudo apt-get install git Docker sudo apt-get install docker sudo apt-get install docker-compose GO sudo…
-
Assembly 1
x86_64 Assembly Packages required: nasm – the Netwide Assembler, a portable 80×86 assembler ld – The GNU linker (compiler) Hello World Breakdown text db “Hello World”,10 text : name of memory address db : define bytes 10 : new line “/n” mov rax 1 : write syscall mov rdi 1 : output mov rdx :…
-
Assembly 2
x86_64 Assembly Packages required: nasm – the Netwide Assembler, a portable 80×86 assembler ld – The GNU linker (compiler) User Input Breakdown There are 4 subroutines in this program: _printText1 _getName _printText2 _printName _getName utilizes the read syscall and stores the user input The name variable has 16 bytes assigned it , a basic buffer…
-
Reverse Engineering – 0x01
Download the challenge : here Tools used : Test out the program Use gdb to disassemble Set to intel syntax and disassemble the main function. Let’s use ghidra to color code and analyze the assembly code. Let’s head back to gdb and crack the program. Set a breakpoint in the main function. A breakpoint is…
-
Reverse Engineering : I
https://www.begin.re/playground-exercises Good_Luck Dissemble in Ghidra Assembly Code Program compares user input with 6170 if (UserInput * 5 == 6170) : 6170 / 5 = 1234
-
Reverse Engineering : 3
https://crackmes.one/crackme/5c11dcaf33c5d41e58e00578 Test out the program. Use Ghidra to analyze the program local_1c = password (text = ?carcysae) local_14 = continue of password (text = k) local_12 = user’s input The function will compare the password to the user’s input. Let’s try password as easycrack.