Skip to content
BOOK_GHANIM

BOOK_GHANIM

  • ProgrammingExpand
    • C#
    • Python
  • CyberSecExpand
    • Articles
    • HandbooksExpand
      • Active Directory – Notes, Methodology, Cheatsheet
      • AV Evasion 101: Essential Techniques and Concepts
      • Buffer Overflow – Notes and cheatsheet
      • Command And Control – C2 Framework
      • OSEP Checklist
      • Pivoting and port forwarding guide
      • THM – Windows Privilege Escalation – Part 16
      • THM – Linux Privilege Escalation – Part 15
      • THM – Common Linux Privilege Escalation – Part 20
      • THM – NMAP Documentation and Commands – Part 13
      • THM – What the Shell – Part 19
    • Notes
    • Write-ups
  • GuidesExpand
    • HomeLab
    • Homelab Cheatsheet
  • HandbooksExpand
    • Handbook I ? Basic
    • Handbook II ? Advanced
    • Handbook III ? Cloud
    • Handbook IV ? RedTeam
    • Handbook V ? Maldev
  • Methodology
  • Toolbox
  • About
  • Search
BOOK_GHANIM
BOOK_GHANIM

Day: April 5, 2022

TJ_Null’s OSCP Prep – HTB – Tabby
Writeups

TJ_Null’s OSCP Prep – HTB – Tabby

Byaghanim April 5, 2022April 5, 2022

On this Linux machine I abused LFI to find the password for admin panel for Tomcat. From there I used CLI to upload .WAR file to get a reverse shell. In /var/www there was a zip file which was password protected. Cracking the password using John, we find the credentials for the user Ash. From…

Read More TJ_Null’s OSCP Prep – HTB – TabbyContinue

TJ_Null’s OSCP Prep – HTB – FriendZone
Writeups

TJ_Null’s OSCP Prep – HTB – FriendZone

Byaghanim April 5, 2022April 5, 2022

This Linux machine had a PHP page with LFI vulnerability. To upload a webshell I used SMB. From there we find credentials from a database config file. To root the machine I added a reverse shell to a writeable python module which was called upon by a python script run by root in cronjob. Enumeration…

Read More TJ_Null’s OSCP Prep – HTB – FriendZoneContinue

TJ_Null’s OSCP Prep – HTB – Sunday
Writeups

TJ_Null’s OSCP Prep – HTB – Sunday

Byaghanim April 5, 2022

On this Solaris machine we used finger to enumerate users. We then guessed the password for the enumerated user to get SSH access. From there we escalated our privilege to Sammy through a shadow file we had access to. I cracked the password and as able to SU to Sammy. Sammy was able to run…

Read More TJ_Null’s OSCP Prep – HTB – SundayContinue

© 2025 BOOK_GHANIM

Search
  • Programming
    • C#
    • Python
  • CyberSec
    • Articles
    • Handbooks
      • Active Directory – Notes, Methodology, Cheatsheet
      • AV Evasion 101: Essential Techniques and Concepts
      • Buffer Overflow – Notes and cheatsheet
      • Command And Control – C2 Framework
      • OSEP Checklist
      • Pivoting and port forwarding guide
      • THM – Windows Privilege Escalation – Part 16
      • THM – Linux Privilege Escalation – Part 15
      • THM – Common Linux Privilege Escalation – Part 20
      • THM – NMAP Documentation and Commands – Part 13
      • THM – What the Shell – Part 19
    • Notes
    • Write-ups
  • Guides
    • HomeLab
    • Homelab Cheatsheet
  • Handbooks
    • Handbook I ? Basic
    • Handbook II ? Advanced
    • Handbook III ? Cloud
    • Handbook IV ? RedTeam
    • Handbook V ? Maldev
  • Methodology
  • Toolbox
  • About
  • Search