3 Ergebnis(se) werden angezeigt

HTB: Return Walkthrugh

Enumeration NMAP Printer-Page The password field cannot be manipulated to reveal the password. However, the authentication target address can be customized. Set it to your own IP address and listen with netcat on the corresponding port. Exploitation With valid credentials, exploitation of the system can be started. Use Evil-WinRM to get CLI access: Check for …

HTB: Cap Walkthrough

Description Plattform: Hack the BoxLink: https://www.hackthebox.com/machines/capDifficulty: Easy 🟠 Enumeration NMAP Website There different topics in the side-menu. I tried some command injection but this didnt worked there. So move on to this „data-scan or security-scan“ which looked most interesting for me. After some digging around I found out that this application is vurnable to IDOR (insecure …

Use vi/vim for privilege escalation

While infilatrating a system it is mostly necessary no escalate your privileges to another user or the root user. While learning about priv-esc on linux-system I often used a simple technique which is based on misconfigured binarys. For example if a lower priv user is allowed to run a program with sudo and no password …