Fristi Leaks

Fristi Leaks 1.3 Enumeration Started out with a basic nmap all ports t4 timing and service detection. nmap -p- -sV -t4 Below you can see the full output. We’ve got Port 80 open time to explore a web app. So much pink let’s run a nikto and start poking around. While nikto was running I curled the robot.txt From that we see the /cola/ /sisi/ /beer/ directories going to those takes me to a Jedi! [Read More]

Kioptrix 4

Kioptrix 1.3 #4 Enumeration Started by running nmap scans on the target machine. nmap -p- -sV -T 4 Alright so we’ve got: - 22 OpenSSH 4.7p1 - 80 Apache 2.2.8 with Suhosin-Patch also PHP/5.2.4 - 139 Samba SMBD - 445 Samba SMBD Last couple machines I had done had been web apps so I started with Samba first. Using the nmap scripting engine or NSE for short. I run the smb-enum-shares script to see what kind of shares I can find. [Read More]

Kioptrix 3

Kioptrix 1.2 #3 Initial Info Make sure to Point your host file in your Kali Box to the machines IP. nano /etc/hosts Add kioptrix IP and like below. And Just to be sure ping to make sure the address is correct. Recon Scanned Target with nmap. nmap -p- -sV ipaddress Found port 80 and 22 open. So we have a web server and ssh available. Unless ssh is a really old version or looks funky I’ll most likely skip it. [Read More]

Kioptrix 2

Kioptrix Level 1.1 This one taught me something I should’ve learned a long time ago. By the end of this VM, I was banging my head against a wall for NO REASON but I had done several Vulnerable Machines that night. Enumeration I started off Creating my folder on the desktop labeled as kioptrix_1.1 and then started my enumeration steps. I know the folder step sounds silly but Over 2 rounds of PWK labs and getting lots of boxes on hack the box I’ve come to appreciate methodology and organization. [Read More]

Kioptrix 1

Kioptrix 1 I am going through the OSCPLike Vulnhub list from the netsecfocus group before I take my third attempt at my OSCP Exam. You can find the NetSecFocus Vulnhub Trophy Room Google Doc by joining Mattermost and going to the Vulnhub and CTF channel. The Machines listed in Red on the Doc are the most OSCP like Machines. I started up Virtualbox and Created a pfsense router that all my traffic would pass through for my Virtualbox Lab. [Read More]