Skip to content
BOOK_GHANIM

BOOK_GHANIM

  • ProgrammingExpand
    • C#
    • Python
  • CyberSecExpand
    • Articles
    • HandbooksExpand
      • Active Directory – Notes, Methodology, Cheatsheet
      • AV Evasion 101: Essential Techniques and Concepts
      • Buffer Overflow – Notes and cheatsheet
      • Command And Control – C2 Framework
      • OSEP Checklist
      • Pivoting and port forwarding guide
      • THM – Windows Privilege Escalation – Part 16
      • THM – Linux Privilege Escalation – Part 15
      • THM – Common Linux Privilege Escalation – Part 20
      • THM – NMAP Documentation and Commands – Part 13
      • THM – What the Shell – Part 19
    • Notes
    • Write-ups
  • GuidesExpand
    • HomeLab
    • Homelab Cheatsheet
  • HandbooksExpand
    • Handbook I ? Basic
    • Handbook II ? Advanced
    • Handbook III ? Cloud
    • Handbook IV ? RedTeam
    • Handbook V ? Maldev
  • Methodology
  • Toolbox
  • About
  • Search
BOOK_GHANIM
BOOK_GHANIM
  • TJ_Null’s OSCP Prep – HTB – Buff
    Writeups

    TJ_Null’s OSCP Prep – HTB – Buff

    Byaghanim March 17, 2022

    On this Windows machine I exploited a Gym Management System to get remote code execution. After enumerating the machine there was a port, 8888, listening on localhost. Looking at the processes we find that its running CloudMe. I’ll use chisel to tunnel traffic from my machine to the target. In the the users download folder…

    Read More TJ_Null’s OSCP Prep – HTB – BuffContinue

  • TJ_Null’s OSCP Prep – HTB – Poison
    Writeups

    TJ_Null’s OSCP Prep – HTB – Poison

    Byaghanim March 11, 2022

    On this linux box I used a LFI vulnerability in the webserver to get a users password which was encoded 13 times with base64. After finding the password, we read /etc/password and found a username charix. Using that username and password I SSH into the machine. In Charix folder there was a secret.zip. After enumerating…

    Read More TJ_Null’s OSCP Prep – HTB – PoisonContinue

  • TJ_Null’s OSCP Prep – HTB – Bounty
    Writeups

    TJ_Null’s OSCP Prep – HTB – Bounty

    Byaghanim March 7, 2022

    On this Windows machine I abused an upload vulnerability to get remote code execution. When trying to upload a webshell, I got an error message hinting that uploading a web.config was allowed. There is a great post about uploading a web.config with command execution possiblity. To elevate my privilege I used Juicy potato vulnerability to…

    Read More TJ_Null’s OSCP Prep – HTB – BountyContinue

  • TJ_Null’s OSCP Prep – HTB – Grandpa
    Writeups

    TJ_Null’s OSCP Prep – HTB – Grandpa

    Byaghanim February 25, 2022March 1, 2022

    This box was similar to Grandma, where I abused a BOF in IIS 6 and got a shell. Since this is a windows server 2003 I used token kidnapping to escalate my privileges. Enumeration I’ll start with a NMAP scan. Only one port open. Port 80 and its running IIS httpd 6.0. A quick google…

    Read More TJ_Null’s OSCP Prep – HTB – GrandpaContinue

  • TJ_Null’s OSCP Prep – HTB – Valentine
    Writeups

    TJ_Null’s OSCP Prep – HTB – Valentine

    Byaghanim February 22, 2022February 25, 2022

    This linux box was vulnerable to heartbleed. In one of the subdirectories there was a encoded file, which when decoded gave us a SSH private key. Using heartbleed PoC I was able to extract the passphrase from memory and use that to ssh into the machine. To escalate my privileges there were two methods; using…

    Read More TJ_Null’s OSCP Prep – HTB – ValentineContinue

  • TJ_Null’s OSCP Prep – HTB – Sense
    Writeups

    TJ_Null’s OSCP Prep – HTB – Sense

    Byaghanim February 22, 2022February 22, 2022

    This Linux box was a easy box where I found a username and used the pfsense’s default password, pfsense, to get access to the firewall. Then I exploited a vulnerability that allowed authenticated users to execute arbitrary code to get a shell. The shell was root so there was no need for privilege escalation. Enumeration…

    Read More TJ_Null’s OSCP Prep – HTB – SenseContinue

  • TJ_Null’s OSCP Prep – HTB – Nibble
    Writeups

    TJ_Null’s OSCP Prep – HTB – Nibble

    Byaghanim February 18, 2022February 18, 2022

    This Linux machine was running a vulnerable blog running the engine Nibbleblog which was vulnerable to arbitrary file upload. To get root shell I used command injection i a script the user was able to run as sudo. Enumeration I’ll start with an NMAP scan. There are two ports open, 22 and 80. Visiting port…

    Read More TJ_Null’s OSCP Prep – HTB – NibbleContinue

  • TJ_Null’s OSCP Prep – HTB – Armageddon
    Writeups

    TJ_Null’s OSCP Prep – HTB – Armageddon

    Byaghanim February 18, 2022February 18, 2022

    This Linux machine had drupal running on one of the ports. I used drupalgeddon2 to upload a webshell and be able to run commands. I upgraded my shell, but could not get PTY so I had to read from the database using the command line. I then got the credentials to brudetherealadmin and he was…

    Read More TJ_Null’s OSCP Prep – HTB – ArmageddonContinue

  • TJ_Null’s OSCP Prep – HTB – Forest
    Writeups

    TJ_Null’s OSCP Prep – HTB – Forest

    Byaghanim February 7, 2022February 7, 2022

    This is an Active Directory machine. After enumerating SMB it leaks a list of users. I then used impacket-GetNPUsers to look for users without Kerberos pre-authentication required attribute. There was one user, svc-alfresco, which didnt have kerberos pre-authentication enabled and I got a hash. I cracked the hash using john the ripper, and used Evil-WinRM…

    Read More TJ_Null’s OSCP Prep – HTB – ForestContinue

  • TJ_Null’s OSCP Prep – HTB – OpenAdmin
    Writeups

    TJ_Null’s OSCP Prep – HTB – OpenAdmin

    Byaghanim February 6, 2022April 6, 2022

    This Linux machine was very cluttered and I had to keep my notes really organized not to get lost. Getting initial shell was very straight forward with RCE in OpenNt. After getting shell as www-data I found DB credentials that happened to be the same passoword as Jimmy’s. There were also a hash in the…

    Read More TJ_Null’s OSCP Prep – HTB – OpenAdminContinue

  • TJ_Null’s OSCP Prep – HTB – Arctic
    Writeups

    TJ_Null’s OSCP Prep – HTB – Arctic

    Byaghanim February 1, 2022February 1, 2022

    This Windows machine was a relativly easy machine. There was FMTP server running on port 8500, and in that FMTP it was pointing to /administrator directory which was running Adobe Cold Fusion. Cold fusion was vulnerable to file upload RCE which we exploited and got a shell. I then used MS10-059 vulnerabilty to get a…

    Read More TJ_Null’s OSCP Prep – HTB – ArcticContinue

  • TJ_Null’s OSCP Prep – HTB – ScriptKiddie
    Writeups

    TJ_Null’s OSCP Prep – HTB – ScriptKiddie

    Byaghanim January 31, 2022March 2, 2022

    Even though the name of this machine implies that we’re going to do something easy, it was the opposite. With a hard enumeration phase, there was also horizontal movement through abusing a scritp pwn‘s home directory. After that getting root was abusing the fact that the user pwn could run metasploit as root. Enumeration I’ll…

    Read More TJ_Null’s OSCP Prep – HTB – ScriptKiddieContinue

  • TJ_Null’s OSCP Prep – HTB – Love
    Writeups

    TJ_Null’s OSCP Prep – HTB – Love

    Byaghanim January 28, 2022January 28, 2022

    This Windows machine have a SSRF vulnerability. Through SSRF we get credentials to a webserver hosting a voting system, that have a upload RCE that I’ll abuse to get reverse shell. The user have a registery that allows us to install .msi files as NT AUTHORITY\SYSTEM, giving is administrator access. I’ll start with a NMAP…

    Read More TJ_Null’s OSCP Prep – HTB – LoveContinue

  • TJ_Null’s OSCP Prep – HTB – Bashed
    Writeups

    TJ_Null’s OSCP Prep – HTB – Bashed

    Byaghanim January 28, 2022January 28, 2022

    This Linux box was quiet interesting. In the webservers subdirectory there was a shell embedded in a PHP file. I used python to get a reverse shell on netcat, which gives me a better terminal. I abused a kernel exploit to get root shell. Enumeration I’ll start with a NMAP scan. Only port 80 open…

    Read More TJ_Null’s OSCP Prep – HTB – BashedContinue

  • TJ_Null’s OSCP Prep – HTB – Active
    Writeups

    TJ_Null’s OSCP Prep – HTB – Active

    Byaghanim January 28, 2022January 28, 2022

    This is a Active Directory box. Because of SMB null session, we found Group Policy Prefance encrypted password stored in cpassword. We decrypted that and got credentials for SVC_TGS. Using these credentials we kerberoasting technique to get hash for the user Administrator. I then cracked that hash, and used psexec to gain shell on the…

    Read More TJ_Null’s OSCP Prep – HTB – ActiveContinue

Page navigation

Previous PagePrevious 1 2 3 4 … 7 Next PageNext

© 2025 BOOK_GHANIM

Search
  • Programming
    • C#
    • Python
  • CyberSec
    • Articles
    • Handbooks
      • Active Directory – Notes, Methodology, Cheatsheet
      • AV Evasion 101: Essential Techniques and Concepts
      • Buffer Overflow – Notes and cheatsheet
      • Command And Control – C2 Framework
      • OSEP Checklist
      • Pivoting and port forwarding guide
      • THM – Windows Privilege Escalation – Part 16
      • THM – Linux Privilege Escalation – Part 15
      • THM – Common Linux Privilege Escalation – Part 20
      • THM – NMAP Documentation and Commands – Part 13
      • THM – What the Shell – Part 19
    • Notes
    • Write-ups
  • Guides
    • HomeLab
    • Homelab Cheatsheet
  • Handbooks
    • Handbook I ? Basic
    • Handbook II ? Advanced
    • Handbook III ? Cloud
    • Handbook IV ? RedTeam
    • Handbook V ? Maldev
  • Methodology
  • Toolbox
  • About
  • Search