<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Skills Assessment on </title>
    <link>https://old.frang4.tech/tags/skills-assessment/</link>
    <description>Recent content in Skills Assessment on </description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 03 Jun 2025 03:38:50 -0300</lastBuildDate>
    <atom:link href="https://old.frang4.tech/tags/skills-assessment/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Attacking Common Applications - Part I</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-i/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-i/writeup/</guid>
      <description>&lt;p&gt;This is the part one of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We are presented with a Windows host that has several services running. Among these the vulnerable one is &lt;code&gt;Tomcat 9.0.0.M1&lt;/code&gt; running on port 8080. This does not have any manager pages available, and its vulnerable to several CVEs including Ghostcat and CVE-2019-0232, the latter was the key to get into the machine, as it allowed for RCE. The problem here is that this RCE wasn’t that straight forward, first we needed to fuzz a vulnerable CGI script located in &lt;code&gt;/cgi/cmd.bat&lt;/code&gt; and the use a metasploit module that abused this vulnerability to obtain a reverse shell as &lt;code&gt;NT authority/system&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Attacking Common Applications - Part II</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-ii/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-ii/writeup/</guid>
      <description>&lt;p&gt;This is the part two of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We began by scanning the target and identified several open ports hosting potentially interesting services. One of them was GitLab, accessible via a provided virtual host. Enumeration of the GitLab instance revealed a public repository referencing another virtual host: &lt;code&gt;monitoring&lt;/code&gt;, which resolved to a Nagios instance.&lt;/p&gt;&#xA;&lt;p&gt;Next, we created an account on GitLab and logged in. This revealed additional repositories, one of which contained hardcoded credentials for the Nagios web interface. Using these, we accessed the Nagios instance as an admin.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Attacking Common Applications - Part III</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-iii/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-iii/writeup/</guid>
      <description>&lt;p&gt;This is the part two of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;situation&#34;&gt;Situation&lt;/h2&gt;&#xA;&lt;p&gt;During our penetration test our team found a Windows host running on the network and the corresponding credentials for the Administrator. It is required that we connect to the host and find the &lt;code&gt;hardcoded password&lt;/code&gt; for the MSSQL service.&#xA;&lt;strong&gt;What is the hardcoded password for the database connection in the MultimasterAPI.dll file?&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;enumeration&#34;&gt;Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;We are given the credentials &lt;code&gt;Administrator&lt;/code&gt;:&lt;code&gt;xcyj8izxNVzhf4z&lt;/code&gt; and a dynamic-linked libraty &lt;code&gt;MultimasterAPI.dll&lt;/code&gt; to analyze, so the first thing was loggin into the box and search for this file, we get 3 hits, but from the path I decide to start with the first one.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Active Directory Enumeration and Attacks - Part I</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/active-directory-enumeration-and-attacks/part-i/writeup/</link>
      <pubDate>Tue, 08 Apr 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/active-directory-enumeration-and-attacks/part-i/writeup/</guid>
      <description>&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We gain initial access to the internal Active Directory environment through a web shell. We begin by enumerating the host and retrieving the first flag located on the administrator’s desktop. Using the compromised host, the web shell, and &lt;strong&gt;Ligolo-ng&lt;/strong&gt;, we pivot into the internal network.&lt;/p&gt;&#xA;&lt;p&gt;During internal enumeration, we discover a host named &lt;code&gt;MS01&lt;/code&gt;. We compromise the local administrator account on this machine using a &lt;strong&gt;Pass-the-Hash&lt;/strong&gt; attack, leveraging NTLM hashes obtained from the initial foothold.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SQLMap - Skills Assessment</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/sqlmap/writeup/</link>
      <pubDate>Sun, 08 Dec 2024 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/sqlmap/writeup/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;&lt;code&gt;sqlmap&lt;/code&gt; is an open-source penetration testing tool designed to automate the detection and exploitation of SQL injection vulnerabilities in web applications. It supports a wide range of SQL injection techniques, including boolean-based, time-based, error-based, and UNION query-based attacks.&lt;/p&gt;&#xA;&lt;p&gt;The goal of this module is to introduce us into the tool and how it is useful in real-world scenarios where SQLi is feasible. That&amp;rsquo;s why in this writeup the key is in finding the vulnerable parameter.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
