Vulnhub Me and My Girlfriend: 1 Walkthrough

by Vince
in Blog
Hits: 2835

I'm teaching a class this weekend but my time is limited so instead of building something from scratch, I thought I would grab a couple of the more recent Vulnub boxes to see if there's anything I can use instead.  This box is perfect because I've wanted to give a brief primer on Burp and to make the job easier for the pwning, Burp comes in handy which you'll soon discover. 

Without giving away too much, we kick off with Nmap:

Read more

Powershell : ReverseTCP

by Vince
in Blog
Hits: 1302

First, let me state that this is not my creation -- if it's not obvious with the author's signature in the menu.  I just happen to stumble across it, I watched the Youtube video, and I wanted to see if there was more to it.  The author, zhacker13, has an excellent start and I hope they continue to build this out further.  I didn't bother to check to see if it could bypass a/v or anything like that because in its current state, it has very limited use.  It can, however, get shells, take screenshots, and upload files.  I didn't bother taking a screenshot because that's part of the video.  I did upload a file and that worked flawlessly.

Read more

Powershell : Windows Enumeration

by Vince
in Blog
Hits: 4861

The other day, someone asked me why I run my Nmap scans with the flags that I typically use. I think maybe they were asking why I use sT instead of sS.  I don't think sS is any faster and if I choose to use Nmap, I don't care about the noise.  When I DO care, I'm not using Nmap. 

If you drop onto a Windows machine, right off the bat, what do I want to know?  The OS version, the Fully Qualified Domain Name, and the IP Subnet (/24, /23, /##?).  From there, where is DNS being served.  That's likely to be an important server -- possibly a Domain Controller.  I'd also want to know the location of the mail and web server.  And finally, I'd want to know the names of all of the devices on the network because the names are sometimes telling.

Read more