Hack The Box: Topology

Description Topology is an easy Hack The Box machine that features: VHOST Enumeration LaTeX command injection Sensitive Data Exposure Apache Password Hash Cracking Privilege Escalation via Gnuplot Cron job Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.10.11.217. $ ping -c 3 10.10.11.217 PING 10.10.11.217 (10.10.11.217) 56(84) bytes of data. 64 bytes from 10.10.11.217: icmp_seq=1 ttl=63 time=49.6 ms 64 bytes from 10.10.11.217: icmp_seq=2 ttl=63 time=50.5 ms 64 bytes from 10.10.11.217: icmp_seq=3 ttl=63 time=49.1 ms --- 10.10.11.217 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2004ms rtt min/avg/max/mdev = 49.127/49.749/50.485/0.560 ms The machine is active and with the TTL that equals 63 (64 minus 1 jump) we can assure that it is an Unix machine. Now we are going to do a Nmap TCP SYN port scan to check all opened ports. ...

November 4, 2023 · 8 min

Dynamic Analysis in Android️ - I - Environment️ install

Introduction️ To perform a security audit of an Android application, it is necessary to create a customized environment, which can be based on a physical device or an emulator. For most cases, an emulator will suffice. In this article we will create a virtual machine for Android in x86_64 architecture, and modify it by installing Magisk, to obtain superuser permissions and install modules, and install some applications.️ Installing the Android Emulator For the Android emulator, we have chosen the official Android IDE, Android Studio, which includes support for Android Virtual Devices (AVD). To install the IDE, simply go to its official website and download the installer by accepting the license terms. During the installation process, when selecting the components to install, we will deselect the option Android Virtual Device, as we will configure it later. In this case, we will install the IDE in our Documents directory.️ ...

November 1, 2023 · 6 min

Hack The Box: PC

Description PC is an easy Hack The Box machine that features: gRPC enumeration SQL Injection over gRPC Sensitive Data Exposure PyLoad Vulnerability Privilege Escalation Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.10.11.214. $ ping -c 3 10.10.11.214 PING 10.10.11.214 (10.10.11.214) 56(84) bytes of data. 64 bytes from 10.10.11.214: icmp_seq=1 ttl=63 time=44.1 ms 64 bytes from 10.10.11.214: icmp_seq=2 ttl=63 time=43.8 ms 64 bytes from 10.10.11.214: icmp_seq=3 ttl=63 time=43.4 ms --- 10.10.11.214 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2005ms rtt min/avg/max/mdev = 43.448/43.806/44.133/0.280 ms The machine is active and with the TTL that equals 63 (64 minus 1 jump) we can assure that it is an Unix machine. Now we are going to do a Nmap TCP SYN port scan to check all opened ports. ...

October 27, 2023 · 7 min

Hack The Box: Jupiter

Description Jupiter is a medium Hack The Box machine that features: Subdomain Enumeration to find an opened Grafana dashboard SQL Injection in Grafana due to use raw PostgreSQL queries leading to Remote Command Execution User Pivoting by interacting with Cron job executed by another user User Pivoting by using the Jupiter Notebook ran by another user leading Privilege Escalation by exploiting a custom binary ability of downloading and creating files Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.10.11.216. ...

October 21, 2023 · 12 min

Firestore Gatherer - Dump of an unprotected Firestore database

Introduction️ Firebase Firestore is a NoSQL cloud database provided by Google as part of the Firebase platform that allows developers to store, synchronize and query data in real-time for web, mobile and server applications. Data are organized into individual documents grouped into collections. Each document is a JSON data structure containing key-value pairs.️ Regarding the possible security issues that could be left unprotected by a project that uses Firebase Firestore, here are some points to consider: ...

October 1, 2023 · 5 min

Hack The Box: Format

Description Format is a medium Hack The Box machine that features: Local File Inclusion and File Writing vulnerability in PHP application Nginx proxy_pass directive allows writing to a Redis socket User Pivoting via a password retrieve from the Redis database Privilege Escalation via Python variable printing with a custom license generator Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.10.11.213. ...

September 30, 2023 · 10 min

Hack The Box: Aero

Description Aero is a medium Hack The Box machine that features: Windows Themes vulnerability allowing Remote Command Execution Privilege Escalation via Common Log File System vulnerability Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.10.11.237. $ ping -c 3 10.10.11.237 PING 10.10.11.237 (10.10.11.237) 56(84) bytes of data. 64 bytes from 10.10.11.237: icmp_seq=1 ttl=127 time=118 ms 64 bytes from 10.10.11.237: icmp_seq=2 ttl=127 time=118 ms 64 bytes from 10.10.11.237: icmp_seq=3 ttl=127 time=118 ms --- 10.10.11.237 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2004ms rtt min/avg/max/mdev = 118.253/118.306/118.400/0.066 ms The machine is active and with the TTL that equals 127 (128 minus 1 jump) we can assure that it is an Windows machine. Now we are going to do a Nmap TCP SYN port scan to check all opened ports. ...

September 28, 2023 · 6 min

Hack The Box: Wifinetic

Description Wifinetic is an easy Hack The Box machine that features: Anonymous FTP server allows retrieving credentials and a backup of a configuration of OpenWRT Privilege Escalation via a recovery of a Wi-Fi password by a vulnerability of the Wi-Fi protocol Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.10.11.247. $ ping -c 3 10.10.11.247 PING 10.10.11.247 (10.10.11.247) 56(84) bytes of data. 64 bytes from 10.10.11.247: icmp_seq=1 ttl=63 time=51.0 ms 64 bytes from 10.10.11.247: icmp_seq=2 ttl=63 time=56.6 ms 64 bytes from 10.10.11.247: icmp_seq=3 ttl=63 time=55.1 ms --- 10.10.11.247 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2004ms rtt min/avg/max/mdev = 50.966/54.204/56.583/2.372 ms The machine is active and with the TTL that equals 63 (64 minus 1 jump) we can assure that it is an Unix machine. Now we are going to do a Nmap TCP SYN port scan to check all opened ports. ...

September 13, 2023 · 6 min

Hack The Box: MonitorsTwo

Description MonitorsTwo is an easy Hack The Box machine that features: Remote Command Execution Sensitive Data Exposure Hash Cracking Misconfigured Docker and SUID Privilege Escalation Footprinting First, we are going to check with ping command if the machine is active and the system operating system. The target machine IP address is 10.10.11.211. $ ping -c 3 10.10.11.211 PING 10.10.11.211 (10.10.11.211) 56(84) bytes of data. 64 bytes from 10.10.11.211: icmp_seq=1 ttl=63 time=42.8 ms 64 bytes from 10.10.11.211: icmp_seq=2 ttl=63 time=44.7 ms 64 bytes from 10.10.11.211: icmp_seq=3 ttl=63 time=43.5 ms --- 10.10.11.211 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2003ms rtt min/avg/max/mdev = 42.750/43.657/44.715/0.809 ms The machine is active and with the TTL that equals 63 (64 minus 1 jump) we can assure that it is an Unix machine. Now we are going to do a Nmap TCP SYN port scan to check all opened ports. ...

September 2, 2023 · 9 min

Auto BO - Automated Buffer Overflow

Introducción The buffer overflow, also known as buffer overflow, is a security vulnerability in software programming that occurs when more data is introduced into a memory area (buffer) than it can handle. This situation may allow an attacker to overwrite adjacent data in the memory, which potentially leads to the execution of malicious code or alteration of a program’s flow.️ When a program does not verify the amount of data entered into a buffer, it risks an attacker exploiting this weakness to inject malicious code, overwrite important information or even take control of the system. Prevention of buffer overflow involves good programming practices and the use of security techniques such as input validation and boundary checking to prevent this type of vulnerability.️ ...

September 1, 2023 · 9 min