<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CPTS on </title>
    <link>https://old.frang4.tech/tags/cpts/</link>
    <description>Recent content in CPTS on </description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 03 Jun 2025 03:38:50 -0300</lastBuildDate>
    <atom:link href="https://old.frang4.tech/tags/cpts/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Attacking Common Applications - Part I</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-i/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-i/writeup/</guid>
      <description>&lt;p&gt;This is the part one of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We are presented with a Windows host that has several services running. Among these the vulnerable one is &lt;code&gt;Tomcat 9.0.0.M1&lt;/code&gt; running on port 8080. This does not have any manager pages available, and its vulnerable to several CVEs including Ghostcat and CVE-2019-0232, the latter was the key to get into the machine, as it allowed for RCE. The problem here is that this RCE wasn’t that straight forward, first we needed to fuzz a vulnerable CGI script located in &lt;code&gt;/cgi/cmd.bat&lt;/code&gt; and the use a metasploit module that abused this vulnerability to obtain a reverse shell as &lt;code&gt;NT authority/system&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Attacking Common Applications - Part II</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-ii/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-ii/writeup/</guid>
      <description>&lt;p&gt;This is the part two of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We began by scanning the target and identified several open ports hosting potentially interesting services. One of them was GitLab, accessible via a provided virtual host. Enumeration of the GitLab instance revealed a public repository referencing another virtual host: &lt;code&gt;monitoring&lt;/code&gt;, which resolved to a Nagios instance.&lt;/p&gt;&#xA;&lt;p&gt;Next, we created an account on GitLab and logged in. This revealed additional repositories, one of which contained hardcoded credentials for the Nagios web interface. Using these, we accessed the Nagios instance as an admin.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Attacking Common Applications - Part III</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-iii/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-iii/writeup/</guid>
      <description>&lt;p&gt;This is the part two of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;situation&#34;&gt;Situation&lt;/h2&gt;&#xA;&lt;p&gt;During our penetration test our team found a Windows host running on the network and the corresponding credentials for the Administrator. It is required that we connect to the host and find the &lt;code&gt;hardcoded password&lt;/code&gt; for the MSSQL service.&#xA;&lt;strong&gt;What is the hardcoded password for the database connection in the MultimasterAPI.dll file?&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;enumeration&#34;&gt;Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;We are given the credentials &lt;code&gt;Administrator&lt;/code&gt;:&lt;code&gt;xcyj8izxNVzhf4z&lt;/code&gt; and a dynamic-linked libraty &lt;code&gt;MultimasterAPI.dll&lt;/code&gt; to analyze, so the first thing was loggin into the box and search for this file, we get 3 hits, but from the path I decide to start with the first one.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Linux Privilege Escalation</title>
      <link>https://old.frang4.tech/posts/cpts/linux-privilege-escalation/</link>
      <pubDate>Wed, 07 May 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/linux-privilege-escalation/</guid>
      <description>&lt;p&gt;This post explains the process of enumerating a linux system in order to find paths to escalate privileges.&lt;/p&gt;&#xA;&lt;h2 id=&#34;overiview&#34;&gt;Overiview&lt;/h2&gt;&#xA;&lt;h3 id=&#34;automated-tools&#34;&gt;Automated tools&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://github.com/rebootuser/LinEnum&#34; target=&#34;_blank&#34;&gt;LinEnum&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS&#34; target=&#34;_blank&#34;&gt;linPEAS&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;manual---general-things&#34;&gt;Manual - General things&lt;/h3&gt;&#xA;&lt;p&gt;These are the general things we will be enumerating in the process below&lt;/p&gt;&#xA;&lt;h4 id=&#34;os&#34;&gt;OS&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;OS Version&lt;/li&gt;&#xA;&lt;li&gt;Kernel Version&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;services&#34;&gt;Services&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Running Services: &lt;code&gt;ps aux | grep root&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Installed Packages and Versions&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;user&#34;&gt;User&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;whoami&lt;/code&gt;, &lt;code&gt;id&lt;/code&gt;, &lt;code&gt;hostname&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;User Home Directories&lt;/li&gt;&#xA;&lt;li&gt;Sudo Privileges: &lt;code&gt;sudo -l&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;files--directories&#34;&gt;Files &amp;amp; Directories&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Configuration files: &lt;code&gt;.conf&lt;/code&gt; &amp;amp; &lt;code&gt;.config&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Readable Shadow File&lt;/li&gt;&#xA;&lt;li&gt;Password Hashes in &lt;code&gt;/etc/passwd&lt;/code&gt; (more common on embedded devices and routers)&lt;/li&gt;&#xA;&lt;li&gt;Writeable Directories&lt;/li&gt;&#xA;&lt;li&gt;Writeable Files&lt;/li&gt;&#xA;&lt;li&gt;SETUID and SETGID Permissions&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;cron-jobs&#34;&gt;Cron Jobs&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Under: &lt;code&gt;/etc/cron*&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;file-systems&#34;&gt;File Systems&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Unmounted File System and Aditional Drivers&lt;/li&gt;&#xA;&lt;li&gt;File Systems &amp;amp; Additional Drives&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;process-of-enumeration&#34;&gt;Process of enumeration&lt;/h2&gt;&#xA;&lt;h3 id=&#34;1-gaining-situational-awareness&#34;&gt;1. Gaining Situational Awareness&lt;/h3&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;whoami&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;id&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;hostname&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/os-release&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;echo $PATH&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;env&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;uname -a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lscpu&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/shells&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lsblk    &lt;span style=&#34;color:#75715e&#34;&gt;# block devices&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lpstat   &lt;span style=&#34;color:#75715e&#34;&gt;# printers&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/fstab&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# network information&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;route&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;arp -a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/passwd&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/passwd | cut -f1 -d: &lt;span style=&#34;color:#75715e&#34;&gt;# usernames&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;grep &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;*&lt;/span&gt;$&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;&lt;/span&gt; /etc/passwd&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/group&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;getent group sudo&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls /home&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# file systems&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;df -h&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# unmounted fs&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/fstab | grep -v &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;#&amp;#34;&lt;/span&gt; | column -t&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# hidden files for $USER&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f -name &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;.*&amp;#34;&lt;/span&gt; -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null | grep $USER&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# setuid files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -perm -4000 -exec ls -ldb &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -perm -4000 -type f -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# setgid files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -uid &lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt; -perm -6000 -type f 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# hidden directories&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type d -name &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;.*&amp;#34;&lt;/span&gt; -ls 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls /var/tmp   &lt;span style=&#34;color:#75715e&#34;&gt;# data retained 30 days&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls /tmp       &lt;span style=&#34;color:#75715e&#34;&gt;# data retained 10 days or until system reboot&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h3 id=&#34;2-linux-services--internals-enumeration&#34;&gt;2. Linux Services &amp;amp; Internals Enumeration&lt;/h3&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ip a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/hosts&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lastlog &lt;span style=&#34;color:#75715e&#34;&gt;# users&amp;#39;s last login command&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;who     &lt;span style=&#34;color:#75715e&#34;&gt;# check who&amp;#39;s logged in&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;finger&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;history&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f &lt;span style=&#34;color:#ae81ff&#34;&gt;\(&lt;/span&gt; -name *_hist -o -name *_history &lt;span style=&#34;color:#ae81ff&#34;&gt;\)&lt;/span&gt; -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# finding history files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# Cronjobs&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls -la /etc/cron.*/&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/crontab&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# writeable files (check for cronjob abuse)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -path /proc -prune -o -type f -perm -o+w 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# proc filesystem is a virtual fs that contains info about system processes, hw, system info&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find /proc -name cmdline -exec cat &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null | tr &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;\n&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;apt list --installed | tr &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;/&amp;#34;&lt;/span&gt; &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; | cut -d&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; -f1,3 | sed &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#39;s/[0-9]://g&amp;#39;&lt;/span&gt; | tee -a installed_pkgs.list &lt;span style=&#34;color:#75715e&#34;&gt;# list of installed packages&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;sudo -V  &lt;span style=&#34;color:#75715e&#34;&gt;# sudo version&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls -l /bin /usr/bin/ /usr/sbin/ &lt;span style=&#34;color:#75715e&#34;&gt;# list of binaries&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# compare available binaries against GTFO&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#66d9ef&#34;&gt;for&lt;/span&gt; i in &lt;span style=&#34;color:#66d9ef&#34;&gt;$(&lt;/span&gt;curl -s https://gtfobins.github.io/ | html2text | cut -d&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; -f1 | sed &lt;span style=&#34;color:#960050;background-color:#1e0010&#34;&gt;&amp;#39;&lt;/span&gt;/^&lt;span style=&#34;color:#f92672&#34;&gt;[[&lt;/span&gt;:space:&lt;span style=&#34;color:#f92672&#34;&gt;]]&lt;/span&gt;*$/&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;#  analyze system calls and signal processing&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;strace ping -c1 IP&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f &lt;span style=&#34;color:#ae81ff&#34;&gt;\(&lt;/span&gt; -name *.conf -o -name *.config &lt;span style=&#34;color:#ae81ff&#34;&gt;\)&lt;/span&gt; -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null &lt;span style=&#34;color:#75715e&#34;&gt;# configuration files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# Scripts&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f -name &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;*.sh&amp;#34;&lt;/span&gt; 2&amp;gt;/dev/null | grep -v &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;src\|snap\|share&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ps aux | grep root&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# running services by user&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h3 id=&#34;3-credential-hunting&#34;&gt;3. Credential Hunting&lt;/h3&gt;&#xA;&lt;p&gt;See &lt;a href=&#34;https://old.frang4.tech/posts/cpts/linux-credential-hunting/&#34;&gt;Credential Hunting Linux&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Linux Credential Hunting</title>
      <link>https://old.frang4.tech/posts/cpts/linux-credential-hunting/</link>
      <pubDate>Tue, 06 May 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/linux-credential-hunting/</guid>
      <description>&lt;h2 id=&#34;configuration-files&#34;&gt;&lt;strong&gt;Configuration Files&lt;/strong&gt;&lt;/h2&gt;&#xA;&lt;p&gt;find all possible configuration files on the system&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;for l in $(echo &amp;quot;.conf .config .cnf&amp;quot;);do echo -e &amp;quot;\nFile extension: &amp;quot; $l; find / -name &amp;quot;*$l&amp;quot; **2**&amp;gt;/dev/null | grep -v &amp;quot;lib\|fonts\|share\|core&amp;quot; ;done&lt;/code&gt;&lt;/p&gt;&#xA;&lt;p&gt;run the scan directly for each file found with the specified file extension and output the contents. In this example, we search for three words (user, password, pass) in each file with the file extension .cnf.&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;for i in $(find / -name &amp;quot;*.cnf&amp;quot; **2**&amp;gt;/dev/null | grep -v &amp;quot;doc\|lib&amp;quot;);do echo -e &amp;quot;\nFile: &amp;quot; $i; grep &amp;quot;user\|password\|pass&amp;quot; $i **2**&amp;gt;/dev/null | grep -v &amp;quot;\#&amp;quot;;done&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Active Directory Enumeration and Attacks - Part I</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/active-directory-enumeration-and-attacks/part-i/writeup/</link>
      <pubDate>Tue, 08 Apr 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/active-directory-enumeration-and-attacks/part-i/writeup/</guid>
      <description>&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We gain initial access to the internal Active Directory environment through a web shell. We begin by enumerating the host and retrieving the first flag located on the administrator’s desktop. Using the compromised host, the web shell, and &lt;strong&gt;Ligolo-ng&lt;/strong&gt;, we pivot into the internal network.&lt;/p&gt;&#xA;&lt;p&gt;During internal enumeration, we discover a host named &lt;code&gt;MS01&lt;/code&gt;. We compromise the local administrator account on this machine using a &lt;strong&gt;Pass-the-Hash&lt;/strong&gt; attack, leveraging NTLM hashes obtained from the initial foothold.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SQLMap - Skills Assessment</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/sqlmap/writeup/</link>
      <pubDate>Sun, 08 Dec 2024 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/sqlmap/writeup/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;&lt;code&gt;sqlmap&lt;/code&gt; is an open-source penetration testing tool designed to automate the detection and exploitation of SQL injection vulnerabilities in web applications. It supports a wide range of SQL injection techniques, including boolean-based, time-based, error-based, and UNION query-based attacks.&lt;/p&gt;&#xA;&lt;p&gt;The goal of this module is to introduce us into the tool and how it is useful in real-world scenarios where SQLi is feasible. That&amp;rsquo;s why in this writeup the key is in finding the vulnerable parameter.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
