<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title></title>
    <link>https://old.frang4.tech/</link>
    <description>Recent content on </description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 20 Sep 2025 03:38:50 -0300</lastBuildDate>
    <atom:link href="https://old.frang4.tech/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Fluffy - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/fluffy/writeup/</link>
      <pubDate>Sat, 20 Sep 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/fluffy/writeup/</guid>
      <description>&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We started by enumerating the provided credentials for the user &lt;code&gt;j.fleischman&lt;/code&gt; and identified an SMB share named &lt;code&gt;IT&lt;/code&gt;. After downloading files from the share, we discovered a PDF detailing vulnerabilities, including CVE-2025-24071, which enabled me to craft a malicious &lt;code&gt;.zip&lt;/code&gt; file to leak NTLM hashes via Windows Explorer&amp;rsquo;s automatic file parsing. Using this exploit, we captured the NTLM hash for the user &lt;code&gt;p.agila&lt;/code&gt; and cracked its password.&lt;/p&gt;&#xA;&lt;p&gt;With &lt;code&gt;p.agila&lt;/code&gt;&amp;rsquo;s credentials, we found that the user had &lt;code&gt;GenericAll&lt;/code&gt; permissions over the &lt;code&gt;SERVICE ACCOUNTS&lt;/code&gt; group. This allowed us to add &lt;code&gt;p.agila&lt;/code&gt; to the group and, subsequently, perform a Shadow Credentials attack to impersonate the &lt;code&gt;WINRM_SVC&lt;/code&gt; account, successfully gaining access to the system as that user.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cypher - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/cypher/writeup/</link>
      <pubDate>Thu, 10 Jul 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/cypher/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Cypher&lt;/code&gt; is a Hack The Box machine released on 01 Mar 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Cypher is a HTB machine running a web app that relies on a Neo4j graph database. A &lt;code&gt;Cypher-injection&lt;/code&gt; flaw lets us bypass the login logic and enumerate data. Then, an exposed directory holds a JAR file whose decompiled code reveals a custom Neo4j procedure that executes shell commands without sanitisation (&lt;code&gt;command injection&lt;/code&gt;); exploiting that procedure yields remote code execution and a reverse shell.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Artificial - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/artificial/writeup/</link>
      <pubDate>Tue, 24 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/artificial/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Artificial&lt;/code&gt; is a Hack The Box machine from season 8&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Artificial is a machine with a web interface that allows to upload and execute TensorFlow .h5 model files. The initial foothold was obtained by embedding a reverse shell code inside a Lambda layer and exploiting the backend&amp;rsquo;s behavior which loads these models without sandboxing. From there, we accessed the Flask app&amp;rsquo;s source code, extracted database credentials, dumped the user table, cracked hashes using rockyou.txt, and obtained valid SSH credentials for user gael, leading to the user flag.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Nocturnal - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/nocturnal/writeup/</link>
      <pubDate>Sat, 21 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/nocturnal/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Nocturnal&lt;/code&gt; is a Hack The Box machine released on 12 Apr 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Nocturnal is a Hack The Box machine which serves a web application that allows file upload and download. The interesting/weird thing is that it utilizes a &lt;code&gt;username&lt;/code&gt; parameter in the URL to retrieve and show files for an specific user. This is vulnerable to Insecure Direct Object Reference (IDOR) and also allowed us to enumerate users. Using &lt;code&gt;ffuf&lt;/code&gt; we found user &lt;code&gt;amanda&lt;/code&gt; and were able to read her files finding credentials.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Code - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/code/writeup/</link>
      <pubDate>Sat, 14 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/code/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Code&lt;/code&gt; is a Hack The Box machine released on 22 Mar 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We’re presented with a Python-based code editor exposed via a web application, allowing users to write, save, and execute Python scripts. However, execution is limited by a blacklist of restricted keywords, making direct command execution impossible at first glance. The first part of the challenge involves bypassing these restrictions to achieve Remote Code Execution (RCE).&lt;/p&gt;&#xA;&lt;p&gt;To do so, we leverage &lt;strong&gt;object-oriented introspection&lt;/strong&gt; to enumerate loaded Python subclasses and locate the index of the &lt;code&gt;sys&lt;/code&gt; module. With access to &lt;code&gt;sys.modules&lt;/code&gt;, we enumerate all loaded modules and identify one that exposes a &lt;code&gt;call&lt;/code&gt; function—specifically, &lt;code&gt;subprocess.call()&lt;/code&gt;—which enables us to execute system commands and obtain a reverse shell.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dog - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/dog/writeup/</link>
      <pubDate>Tue, 10 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/dog/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Dog&lt;/code&gt; is a Hack The Box machine released on 08 Mar 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Started by identifying the CMS version and other services running on the target, including &lt;code&gt;Backdrop CMS 1.27.1&lt;/code&gt;. Through endpoint enumeration and exploration of accessible files and directories, I discovered several opened directories, among them &lt;code&gt;.git&lt;/code&gt; which can be downloaded using &lt;code&gt;git-dumper&lt;/code&gt; to retrieve the source code of the applicaiton&lt;/p&gt;&#xA;&lt;p&gt;In the source code I found credentials for the database and some usernames. A lot of password reuse after I managed to access the admin panel using a combination of them. Once there, leveraged an exploit (CVE-2022-43422) to achieve remote code execution (RCE). From there, I established a web shell, which had a trick since it was getting deleted after a minute, so I modified the paylod to get a reverse shell as the &lt;code&gt;www-data&lt;/code&gt; user.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Attacking Common Applications - Part I</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-i/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-i/writeup/</guid>
      <description>&lt;p&gt;This is the part one of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We are presented with a Windows host that has several services running. Among these the vulnerable one is &lt;code&gt;Tomcat 9.0.0.M1&lt;/code&gt; running on port 8080. This does not have any manager pages available, and its vulnerable to several CVEs including Ghostcat and CVE-2019-0232, the latter was the key to get into the machine, as it allowed for RCE. The problem here is that this RCE wasn’t that straight forward, first we needed to fuzz a vulnerable CGI script located in &lt;code&gt;/cgi/cmd.bat&lt;/code&gt; and the use a metasploit module that abused this vulnerability to obtain a reverse shell as &lt;code&gt;NT authority/system&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Attacking Common Applications - Part II</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-ii/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-ii/writeup/</guid>
      <description>&lt;p&gt;This is the part two of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We began by scanning the target and identified several open ports hosting potentially interesting services. One of them was GitLab, accessible via a provided virtual host. Enumeration of the GitLab instance revealed a public repository referencing another virtual host: &lt;code&gt;monitoring&lt;/code&gt;, which resolved to a Nagios instance.&lt;/p&gt;&#xA;&lt;p&gt;Next, we created an account on GitLab and logged in. This revealed additional repositories, one of which contained hardcoded credentials for the Nagios web interface. Using these, we accessed the Nagios instance as an admin.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Attacking Common Applications - Part III</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-iii/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-iii/writeup/</guid>
      <description>&lt;p&gt;This is the part two of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;situation&#34;&gt;Situation&lt;/h2&gt;&#xA;&lt;p&gt;During our penetration test our team found a Windows host running on the network and the corresponding credentials for the Administrator. It is required that we connect to the host and find the &lt;code&gt;hardcoded password&lt;/code&gt; for the MSSQL service.&#xA;&lt;strong&gt;What is the hardcoded password for the database connection in the MultimasterAPI.dll file?&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;enumeration&#34;&gt;Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;We are given the credentials &lt;code&gt;Administrator&lt;/code&gt;:&lt;code&gt;xcyj8izxNVzhf4z&lt;/code&gt; and a dynamic-linked libraty &lt;code&gt;MultimasterAPI.dll&lt;/code&gt; to analyze, so the first thing was loggin into the box and search for this file, we get 3 hits, but from the path I decide to start with the first one.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Planning - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/planning/writeup/</link>
      <pubDate>Mon, 12 May 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/planning/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Planning&lt;/code&gt; is a Hack The Box machine released on 10 May 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Planning is a box with a huge fuzzing to do in order to find a Grafana instance, which was vulnerable to CVE-2024-9264, a critical vulnerability allowing arbitrary command execution via unsanitized SQL input to the DuckDB CLI. Using a proof-of-concept exploit, I was able to read files and execute commands, confirming access to the Grafana container but not the host system. Further enumeration revealed valid credentials for the user enzo, which allowed SSH access to the host system.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Titanic - HTB Machine</title>
      <link>https://old.frang4.tech/posts/htb-machines/titanic/writeup/</link>
      <pubDate>Fri, 09 May 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/htb-machines/titanic/writeup/</guid>
      <description>&lt;p&gt;&lt;code&gt;Titanic&lt;/code&gt; is a Hack The Box machine released on 15 Feb 2025&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;Titanic is a web application with a Local File Inclusion (LFI) vulnerability, which allowed me to enumerate sensitive files, including the &lt;code&gt;/etc/hosts&lt;/code&gt; file that revealed a secondary host &lt;code&gt;dev.titanic.htb&lt;/code&gt;. This led to a Gitea instance where I found configuration files exposing the path to Gitea’s database. Using the LFI vulnerability, I downloaded the database, extracted password hashes for the &lt;code&gt;developer&lt;/code&gt; user, and cracked them to gain SSH access to the machine as &lt;code&gt;developer&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Linux Privilege Escalation</title>
      <link>https://old.frang4.tech/posts/cpts/linux-privilege-escalation/</link>
      <pubDate>Wed, 07 May 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/linux-privilege-escalation/</guid>
      <description>&lt;p&gt;This post explains the process of enumerating a linux system in order to find paths to escalate privileges.&lt;/p&gt;&#xA;&lt;h2 id=&#34;overiview&#34;&gt;Overiview&lt;/h2&gt;&#xA;&lt;h3 id=&#34;automated-tools&#34;&gt;Automated tools&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://github.com/rebootuser/LinEnum&#34; target=&#34;_blank&#34;&gt;LinEnum&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS&#34; target=&#34;_blank&#34;&gt;linPEAS&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;manual---general-things&#34;&gt;Manual - General things&lt;/h3&gt;&#xA;&lt;p&gt;These are the general things we will be enumerating in the process below&lt;/p&gt;&#xA;&lt;h4 id=&#34;os&#34;&gt;OS&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;OS Version&lt;/li&gt;&#xA;&lt;li&gt;Kernel Version&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;services&#34;&gt;Services&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Running Services: &lt;code&gt;ps aux | grep root&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Installed Packages and Versions&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;user&#34;&gt;User&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;whoami&lt;/code&gt;, &lt;code&gt;id&lt;/code&gt;, &lt;code&gt;hostname&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;User Home Directories&lt;/li&gt;&#xA;&lt;li&gt;Sudo Privileges: &lt;code&gt;sudo -l&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;files--directories&#34;&gt;Files &amp;amp; Directories&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Configuration files: &lt;code&gt;.conf&lt;/code&gt; &amp;amp; &lt;code&gt;.config&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Readable Shadow File&lt;/li&gt;&#xA;&lt;li&gt;Password Hashes in &lt;code&gt;/etc/passwd&lt;/code&gt; (more common on embedded devices and routers)&lt;/li&gt;&#xA;&lt;li&gt;Writeable Directories&lt;/li&gt;&#xA;&lt;li&gt;Writeable Files&lt;/li&gt;&#xA;&lt;li&gt;SETUID and SETGID Permissions&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;cron-jobs&#34;&gt;Cron Jobs&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Under: &lt;code&gt;/etc/cron*&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;file-systems&#34;&gt;File Systems&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Unmounted File System and Aditional Drivers&lt;/li&gt;&#xA;&lt;li&gt;File Systems &amp;amp; Additional Drives&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;process-of-enumeration&#34;&gt;Process of enumeration&lt;/h2&gt;&#xA;&lt;h3 id=&#34;1-gaining-situational-awareness&#34;&gt;1. Gaining Situational Awareness&lt;/h3&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;whoami&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;id&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;hostname&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/os-release&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;echo $PATH&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;env&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;uname -a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lscpu&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/shells&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lsblk    &lt;span style=&#34;color:#75715e&#34;&gt;# block devices&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lpstat   &lt;span style=&#34;color:#75715e&#34;&gt;# printers&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/fstab&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# network information&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;route&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;arp -a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/passwd&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/passwd | cut -f1 -d: &lt;span style=&#34;color:#75715e&#34;&gt;# usernames&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;grep &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;*&lt;/span&gt;$&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;&lt;/span&gt; /etc/passwd&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/group&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;getent group sudo&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls /home&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# file systems&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;df -h&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# unmounted fs&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/fstab | grep -v &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;#&amp;#34;&lt;/span&gt; | column -t&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# hidden files for $USER&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f -name &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;.*&amp;#34;&lt;/span&gt; -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null | grep $USER&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# setuid files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -perm -4000 -exec ls -ldb &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -perm -4000 -type f -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# setgid files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -uid &lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt; -perm -6000 -type f 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# hidden directories&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type d -name &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;.*&amp;#34;&lt;/span&gt; -ls 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls /var/tmp   &lt;span style=&#34;color:#75715e&#34;&gt;# data retained 30 days&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls /tmp       &lt;span style=&#34;color:#75715e&#34;&gt;# data retained 10 days or until system reboot&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h3 id=&#34;2-linux-services--internals-enumeration&#34;&gt;2. Linux Services &amp;amp; Internals Enumeration&lt;/h3&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ip a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/hosts&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lastlog &lt;span style=&#34;color:#75715e&#34;&gt;# users&amp;#39;s last login command&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;who     &lt;span style=&#34;color:#75715e&#34;&gt;# check who&amp;#39;s logged in&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;finger&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;history&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f &lt;span style=&#34;color:#ae81ff&#34;&gt;\(&lt;/span&gt; -name *_hist -o -name *_history &lt;span style=&#34;color:#ae81ff&#34;&gt;\)&lt;/span&gt; -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# finding history files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# Cronjobs&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls -la /etc/cron.*/&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/crontab&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# writeable files (check for cronjob abuse)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -path /proc -prune -o -type f -perm -o+w 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# proc filesystem is a virtual fs that contains info about system processes, hw, system info&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find /proc -name cmdline -exec cat &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null | tr &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;\n&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;apt list --installed | tr &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;/&amp;#34;&lt;/span&gt; &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; | cut -d&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; -f1,3 | sed &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#39;s/[0-9]://g&amp;#39;&lt;/span&gt; | tee -a installed_pkgs.list &lt;span style=&#34;color:#75715e&#34;&gt;# list of installed packages&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;sudo -V  &lt;span style=&#34;color:#75715e&#34;&gt;# sudo version&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls -l /bin /usr/bin/ /usr/sbin/ &lt;span style=&#34;color:#75715e&#34;&gt;# list of binaries&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# compare available binaries against GTFO&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#66d9ef&#34;&gt;for&lt;/span&gt; i in &lt;span style=&#34;color:#66d9ef&#34;&gt;$(&lt;/span&gt;curl -s https://gtfobins.github.io/ | html2text | cut -d&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; -f1 | sed &lt;span style=&#34;color:#960050;background-color:#1e0010&#34;&gt;&amp;#39;&lt;/span&gt;/^&lt;span style=&#34;color:#f92672&#34;&gt;[[&lt;/span&gt;:space:&lt;span style=&#34;color:#f92672&#34;&gt;]]&lt;/span&gt;*$/&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;#  analyze system calls and signal processing&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;strace ping -c1 IP&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f &lt;span style=&#34;color:#ae81ff&#34;&gt;\(&lt;/span&gt; -name *.conf -o -name *.config &lt;span style=&#34;color:#ae81ff&#34;&gt;\)&lt;/span&gt; -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null &lt;span style=&#34;color:#75715e&#34;&gt;# configuration files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# Scripts&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f -name &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;*.sh&amp;#34;&lt;/span&gt; 2&amp;gt;/dev/null | grep -v &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;src\|snap\|share&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ps aux | grep root&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# running services by user&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h3 id=&#34;3-credential-hunting&#34;&gt;3. Credential Hunting&lt;/h3&gt;&#xA;&lt;p&gt;See &lt;a href=&#34;https://old.frang4.tech/posts/cpts/linux-credential-hunting/&#34;&gt;Credential Hunting Linux&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Linux Credential Hunting</title>
      <link>https://old.frang4.tech/posts/cpts/linux-credential-hunting/</link>
      <pubDate>Tue, 06 May 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/linux-credential-hunting/</guid>
      <description>&lt;h2 id=&#34;configuration-files&#34;&gt;&lt;strong&gt;Configuration Files&lt;/strong&gt;&lt;/h2&gt;&#xA;&lt;p&gt;find all possible configuration files on the system&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;for l in $(echo &amp;quot;.conf .config .cnf&amp;quot;);do echo -e &amp;quot;\nFile extension: &amp;quot; $l; find / -name &amp;quot;*$l&amp;quot; **2**&amp;gt;/dev/null | grep -v &amp;quot;lib\|fonts\|share\|core&amp;quot; ;done&lt;/code&gt;&lt;/p&gt;&#xA;&lt;p&gt;run the scan directly for each file found with the specified file extension and output the contents. In this example, we search for three words (user, password, pass) in each file with the file extension .cnf.&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;for i in $(find / -name &amp;quot;*.cnf&amp;quot; **2**&amp;gt;/dev/null | grep -v &amp;quot;doc\|lib&amp;quot;);do echo -e &amp;quot;\nFile: &amp;quot; $i; grep &amp;quot;user\|password\|pass&amp;quot; $i **2**&amp;gt;/dev/null | grep -v &amp;quot;\#&amp;quot;;done&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Active Directory Enumeration and Attacks - Part I</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/active-directory-enumeration-and-attacks/part-i/writeup/</link>
      <pubDate>Tue, 08 Apr 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/active-directory-enumeration-and-attacks/part-i/writeup/</guid>
      <description>&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We gain initial access to the internal Active Directory environment through a web shell. We begin by enumerating the host and retrieving the first flag located on the administrator’s desktop. Using the compromised host, the web shell, and &lt;strong&gt;Ligolo-ng&lt;/strong&gt;, we pivot into the internal network.&lt;/p&gt;&#xA;&lt;p&gt;During internal enumeration, we discover a host named &lt;code&gt;MS01&lt;/code&gt;. We compromise the local administrator account on this machine using a &lt;strong&gt;Pass-the-Hash&lt;/strong&gt; attack, leveraging NTLM hashes obtained from the initial foothold.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Introduction to ISO2700X</title>
      <link>https://old.frang4.tech/posts/iso27001/introduction/</link>
      <pubDate>Thu, 06 Feb 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/iso27001/introduction/</guid>
      <description>&lt;h1 id=&#34;que-es-la-iso27001&#34;&gt;¿Que es la ISO27001?&lt;/h1&gt;&#xA;&lt;p&gt;La &lt;strong&gt;ISO 27001&lt;/strong&gt; es una norma internacional que define los requisitos generales y establece que &lt;strong&gt;debes&lt;/strong&gt; implementar controles de seguridad específicos como parte de un &lt;strong&gt;Sistema de Gestión de Seguridad de la Información (SGSI)&lt;/strong&gt;, no detalla cómo hacerlo. Indica &lt;strong&gt;qué&lt;/strong&gt; controles son necesarios para gestionar los riesgos de seguridad de la información de manera efectiva.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;em&gt;Es aplicable a todo tipo de organizaciones donde la información es un activo del que dependen los objetivos y resultados de una organización.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>SQLMap - Skills Assessment</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/sqlmap/writeup/</link>
      <pubDate>Sun, 08 Dec 2024 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/sqlmap/writeup/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;&lt;code&gt;sqlmap&lt;/code&gt; is an open-source penetration testing tool designed to automate the detection and exploitation of SQL injection vulnerabilities in web applications. It supports a wide range of SQL injection techniques, including boolean-based, time-based, error-based, and UNION query-based attacks.&lt;/p&gt;&#xA;&lt;p&gt;The goal of this module is to introduce us into the tool and how it is useful in real-world scenarios where SQLi is feasible. That&amp;rsquo;s why in this writeup the key is in finding the vulnerable parameter.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Post Quantum Cryptography</title>
      <link>https://old.frang4.tech/posts/research/pqc/notes/</link>
      <pubDate>Tue, 16 Jul 2024 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/research/pqc/notes/</guid>
      <description>&lt;p&gt;Notas utilizadas para mi presentacion sobre criptografía post cuántica con la que me recibí de Ingeniero en Computación 🎓&lt;/p&gt;&#xA;&lt;h2 id=&#34;introduccióncontexto-de-pqc&#34;&gt;Introducción/Contexto de PQC&lt;/h2&gt;&#xA;&lt;p&gt;La criptografía de llave pública depende de funciones matemáticas que son “fáciles de hacer y difíciles de deshacer” (to do and to undo). Las variantes más utilizadas hasta ahora son vulnerables al Algoritmo de Shor:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;RSA: factorización de números primos&lt;/li&gt;&#xA;&lt;li&gt;Diffie-Hellman: problema del logaritmo discreto&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;em&gt;Si se puede resolver el problema matemático, se puede romper la criptografía.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>$whoami</title>
      <link>https://old.frang4.tech/about/about/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://old.frang4.tech/about/about/</guid>
      <description>&lt;h1 id=&#34;hi-&#34;&gt;Hi 👋🏻&lt;/h1&gt;&#xA;&lt;p&gt;My name is Francisco, or &lt;code&gt;frang4&lt;/code&gt; and I am a Computer Engineer passioned about computer science and more precisely &lt;em&gt;offensive security&lt;/em&gt;. I am a curious learner and the idea behind this blog/notes is to share some of my work, feel free to reach out.&lt;/p&gt;&#xA;&lt;h2 id=&#34;experience&#34;&gt;Experience&lt;/h2&gt;&#xA;&lt;p&gt;Key highlights:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Hands-on experience in penetration testing, vulnerability assessment, and&#xA;exploit development, gained through both professional roles and active&#xA;participation in CTFs.&lt;/li&gt;&#xA;&lt;li&gt;Technical expertise in DevSecOps and secure infrastructure design.&lt;/li&gt;&#xA;&lt;li&gt;Solid knowledge of risk treatment strategies and compliance with standards&#xA;such as ISO/IEC 27001.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;My background combines offensive and defensive security skills with a strategic&#xA;mindset, allowing me to work cross-functionally with development and operations&#xA;teams to embed security from design through deployment.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
