Exploiting MS14-068 with PyKEK and Kali

Here’s a quick writeup of exploiting MS14-068 using PyKEK and Kali. Kali Prepwork Install and Configure Kerberos Install kerberos: apt-get install krb5-user krb5-config Create relevant kerberos config changes in /etc/krb5.conf: [libdefaults] default_realm = pwn3d.local [realms] pwn3d.local = { kdc = dc1.pwn3d.local admin_server = dc1.pwn3d.local default_domain = pwn3d.local } Point DNS to the DNS Server/domain controller so SRV records (e.g. […]

HTB – Active

Today we are going to solve another CTF challenge “Active”. Active is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Easy Task: To find user.txt and […]

HTB – Nineveh

Today we are going to solve another CTF challenge “Nineveh”. Nineveh is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Medium Task: To find user.txt and […]

HTB – Brainfuck

Today we are going to solve another CTF challenge “Brainfuck” which is retired vulnerable lab presented by Hack the Box for making online penetration testing practices according to your experience level. Although in this challenge you can test your expertise by WordPress penetration testing and how much knowledge you have in cryptography by decrypting any encryption that […]

HTB – Fighter

WriteUp – Fighter (HackTheBox) OCTOBER 6, 2018 / MANUEL LÓPEZ PÉREZ / this post we will resolve the machine Fighter from HackTheBox. It is a Windows machine quite complicated but very interesting to learn new ways to get shell in windows. This is a machine that I resolved with some members of my htb team and without them this writeup would not have […]

HTB – Inception

Today we are going to solve another CTF challenge “Inception”. Inception is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Hard Task: To find user.txt and […]

HTB – Kotarak

Today we are going to solve another CTF challenge “Kotarak”. Hawk is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Hard Task: To find user.txt and […]

Rotten Potato

Never heard about the “Rotten Potato”? If not, read this post written by the authors of this fantastic exploit before continuing: https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/ The mechanism is quite complex, it allows us to intercept the NTLM authentication challenge which occurs during the  DCOM activation through  our endpoint listener and impersonate the user’s security access  token  (in this case […]

http-server: a command-line http server

https://www.npmjs.com/package/http-server http-server: a command-line http server http-server is a simple, zero-configuration command-line http server. It is powerful enough for production usage, but it’s simple and hackable enough to be used for testing, local development, and learning. Installing globally: Installation via npm: apt-get install npm npm install http-server -g This will install http-server globally so that it may be run […]

HTB – Hawk

Today we are going to solve another CTF challenge “Hawk”. Hawk is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Easy Task: To find user.txt and […]