The description states:  "Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers."

    I wanted to like this and perhaps there's much to like but when I'm looking at these types of frameworks, I'm interested in how it can help me.  There's definitely a red team / blue team component to this and maybe that's where this excels but that's of little interest to me.  

    This is the first time I've run a dot net application on Linux so that was kind of cool  And in general, it's a cool tool but I don't see how it will aid me.  

    In this domain, the password complexity rules are set to force a password change every 90 days.  When logging into the Domain Controller, I saw the notification and scheduled the password change with the client.  Upon changing the password, I was immediately locked out of the domain.  Needless to say, that was not how I envisioned the start of my day.  Fortunately, that is not the only privileged account.  Looking through my documentation for this client, the AD admin account should not be tied to ANY resources and yet it must be.  In order to determine the root cause, we look at the Event Viewer.  FYI, I'm fairly confident that Auditing must be enabled in Group Policy for these events to be recorded.  

    Not to be the guy who says this is easy because everyone is somewhere on the ladder but this one is a pretty big softball. 

    The description states:  "This boot2root is a linux based virtual machine and has been tested using VMware workstation 14."  Works fine on VirtualBox which is what I used.

    This is part of a new batch of servers that were dumped overnight and I had a few minutes to spare.

    Kicking off with Nmap:

    Disclosure date:  08/12/19


    Adive Framework 2.0.7 and possibly before are affected by a Cross-Site Scripting vulnerability in the Create New Table and Create New Menu Link functions.  This could lead to cookie stealing and other malicious actions.  This vulnerability can be exploited with the authenticated administrator account.

    While perusing the Vulnub back catalog for boxes that I can suggest to a relatively new penetration tester, I came across the "hackfest" series which sounded familiar.  Searching this site, I realized I'd written up the Quaorar box.  This one, Sedna, is the next in the series which promises to be "medium" in difficulty while the Quaorar box is "very easy".  Quickly glancing at the previous write up and just finishing this one, I'd say they are both "easy" but that's just an opinion.  This one is definitely a good beginner box, in my opinion.

    We kick off with Nmap:

    JSTicket : "Joomla Most Comprehensive & Easiest help desk Plugin"  "JS Support Ticket deeply integrated with Joomla and providing more efficient and professional 1-on-1 dedicated ticket support system to its customers."  

    Essentially, a help desk plugin with a SQL Injection vulnerability. 

    Without logging into the application, we can access the dashboard:

    © 2020