71.9 F
High Point

SSH Tunneling

SSH Tunneling When you need to access a server/client behind a firewall that doesn't allow port forwarding you can use SSH tunneling to bypass that if an SSH server is running. Pivoting is a sneaky technique that hackers use to access computers, servers, and services behind firewalls. These examples will use OpenSSH. I think most examples don't explain this well...
Offensive .NET: theZoo If you've never heard of theZoo and you're in the security space with some .NET development skills this is a real treat for you. The GitHub repository, "theZoo", is a collection of binaries and source code of captured and caged malware. Digging through this I found some .NET malware that you may want to study. Most of...
Parrot OS 4.7 Full-Screen Issue This is a quick easy fix. By default, it appears that Parrot OS 4.7 virtual appliance (.ova) doesn't come with VirtualBox Guest Additions installed. Once you have booted up Parrot OS run this command to install the VirtualBox Guest Utilities. Once this is installed, you may reboot and everything should be fine. VirtualBox Guest Additions The VirtualBox...
Attempted Hack I was recently looking through some docker logs for a web server container and I saw some suspicious commands being passed to the web server. It was very obvious with a quick glance that it was a hacker trying to compromise the web server. Out of curiosity, I decided to reverse engineer their process to figure out what...
CTF: PwnLab Init Walkthrough https://www.vulnhub.com/entry/pwnlab-init,158/ In this walkthrough, I'll be using Parrot OS. I'll break each vulnerability down and explain it. The video won't demonstrate all of the techniques that could have been applied. I will also list the techniques I've learned from others. Exploits / Techniques Local File Inclusions (LFI)Password ReusePrivilege Elevation through compiled code.Remote Code ExecutionReverse ShellSpawning Interactive Shells Pre-Attack NetDiscover First Identify...
Can you trace an IP Address to a hacker? This is a very open-ended question with a lot of variables that come into play. Depending upon how skilled the hacker is, determines how and if the hacker can mask or hide their true identity. It's also very critical to know exactly when the hacker was using that IP address because...
Gutenberg Plugin: Terminal Display Currently building a Gutenberg plugin to display Parrot OS terminal output. Github: https://github.com/mrjamiebowman/Gutenberg-Terminal-Display Parrot Security OS Parrot Security OS ┌───└──╼ $ nmap -sV 127.0.0.1(Gutenberg Terminal Display) PowerShell PS C:Usersuser> nmap -sV 127.0.0.1(Gutenberg Terminal Display) BlackArch Kali

CTF: Kioptrix 3

CTF: Kioptrix 3 This is another OSCP like VulnHub that was very fun to do. I didn't have any issues rooting this one and was able to do it rather quickly.You will get practice with: nmapmetasploitmysql clientfile privilege escalation Enumeration I start off with an arp-scan to find the local machine... and it turns out that my box is 192.168.0.46. Let's get this...
Ubiquiti Edgerouter Lite
Upgrading Firmware on a Ubiquiti Edgerouter Lite with SSH The Ubiquiti Edgerouter Lite provides the ability to create a virtual LAN (vLAN) for $129 dollars. This is a quality VPN solution that was highly recommend from someone who owns a data center. Seriously... well worth the money. Upgrading my router from firmware version 1.2 was difficult because there is a bug...
Privilege Escalation: Writing a User to /etc/passwd Sometimes an application will be misconfigured and will have the capability to read/write to the /etc/passwd file. This code below creates a hashed password and demonstrates how to echo that into the /etc/passwd file. Further Reading https://www.cyberciti.biz/faq/understanding-etcpasswd-file-format/
Software Architect

WEATHER

High Point
broken clouds
71.9 ° F
75.2 °
68.7 °
79 %
1.6mph
75 %
Sun
88 °
Mon
77 °
Tue
84 °
Wed
80 °
Thu
76 °

FOLLOW ME

131FollowersFollow
356FollowersFollow
16SubscribersSubscribe

Random article