Vulnhub dpwwn: 1 Walkthrough

by Vince
in Blog
Hits: 2078

Not to be the guy who says this is easy because everyone is somewhere on the ladder but this one is a pretty big softball. 

The description states:  "This boot2root is a linux based virtual machine and has been tested using VMware workstation 14."  Works fine on VirtualBox which is what I used.

This is part of a new batch of servers that were dumped overnight and I had a few minutes to spare.

Kicking off with Nmap:

Read more

Vulnhub hackfest2016: Sedna Walkthrough

by Vince
in Blog
Hits: 2483

While perusing the Vulnub back catalog for boxes that I can suggest to a relatively new penetration tester, I came across the "hackfest" series which sounded familiar.  Searching this site, I realized I'd written up the Quaorar box.  This one, Sedna, is the next in the series which promises to be "medium" in difficulty while the Quaorar box is "very easy".  Quickly glancing at the previous write up and just finishing this one, I'd say they are both "easy" but that's just an opinion.  This one is definitely a good beginner box, in my opinion.

We kick off with Nmap:

Read more

Identify AD Lockout Source

by Vince
in Blog
Hits: 1119

In this domain, the password complexity rules are set to force a password change every 90 days.  When logging into the Domain Controller, I saw the notification and scheduled the password change with the client.  Upon changing the password, I was immediately locked out of the domain.  Needless to say, that was not how I envisioned the start of my day.  Fortunately, that is not the only privileged account.  Looking through my documentation for this client, the AD admin account should not be tied to ANY resources and yet it must be.  In order to determine the root cause, we look at the Event Viewer.  FYI, I'm fairly confident that Auditing must be enabled in Group Policy for these events to be recorded.  

Read more