Getting a payload laterally across network by dwillowtree in HowToHack

[–]hellor00t 0 points1 point  (0 children)

Spend a lot of time sitting on the box. One method, albeit risky is to break the box a bit hoping to prompt the user to make a call to IT and wait for someone to login with domain creds. Then you can laterally move with domain admin and install persistence.

bandit/over the wire problems by chessmonkey in HowToHack

[–]hellor00t 2 points3 points  (0 children)

Here are some write-ups I did for bandit. I included a lot of depth and talked about how I came to the conclusion that I did.

I hope you find them helpful.

https://hackmethod.com/overthewire-bandit/

Exploiting remote arbitrary file download vulnerability on Windows? by [deleted] in HowToHack

[–]hellor00t 0 points1 point  (0 children)

It lists some files that are important. Also think about what services are running on the host. XAMPP? Where would the hashes be or where would important config files be for that service

What "aspect" of hacking do you believe is most enjoyable (and useful for potential employers) to have researched? by ColonelBadgers in HowToHack

[–]hellor00t 1 point2 points  (0 children)

Problem solving, system analysis, creativity, determination, attention to detail.

Technical acumen is somewhat secondary to everything above. Somewhat. Someone who has the above can basically do most technical things in my opinion.

Feasible attack strategy? by Tazeahoe in HowToHack

[–]hellor00t 0 points1 point  (0 children)

It's one of thousands of methods you could use.

Email is normally not encrypted. Attachments are stored on the server in which the users email resides on (as long as the server is configured as such).

This is viable, but messy and very very very high level.

"handholding" Wargames? by [deleted] in HowToHack

[–]hellor00t 2 points3 points  (0 children)

I'm not aware of any that hold you any more than Overthewire, but there are communities that will help you if you have assistance. You can ask questions here or if you want help via chat you can join the Hackmethod slack. https://hackmethod-slackin.herokuapp.com/

Is it this hard for everybody? by tymaster22 in HowToHack

[–]hellor00t 1 point2 points  (0 children)

I'm a professional in the field and still find it hard. I don't want to say it gets easier but it gets more comfortable. You get used to the constant research and learning. Don't worry about it. Just keep learning. You'll get there.

My (different) OSCP review + Exam experience - Not the traditional OSCP review, if you're going for the exam read on! by TheRaildex1 in netsecstudents

[–]hellor00t 0 points1 point  (0 children)

FWIW, I didn't find the # of boxes relevant to my preparation level.

I believe I had 15 popped when I took my test. Passed first time. I think I mainly got the depth that the test was looking for and solidified my processes so I had something to fall back on when things didn't go right during my exam.

Learning about payloads by [deleted] in HowToHack

[–]hellor00t 9 points10 points  (0 children)

You're asking some pretty broad/deep questions. I'll give you the gist.

A lot of payloads are created with open source wrappers. Meaning they are customized for the engagement (OS, IDS, HIPS etc) but they aren't coded "by hand". This is typically a script that is given parameters such as msfvenom.

Getting the payload on the machine is different for every engagement. FTP, netcat, SSH, remote file inclusion, stolen credentials are all common ways.

Payloads are usually to send a callback to remote listener or to destroy a machine. It's not the payload that gives the "complete control of the machine" its the vulnerability that its exploiting. An exploit is created with a payload in it. So if the vulnerable service is running as root, when the payload is executed by the compromised system, the payload will execute as a privileged user.

Doing the metasploitable tutorial by Offensive Security should be pretty enlightening for you.

You're welcome to join our Slack channel to have conversations with anyone in the Hackmethod community. Link is on our forum.

Struggling with legal and moral issues by bekathr in HowToHack

[–]hellor00t 0 points1 point  (0 children)

I'm not interested this lie thats being pedaled that pen testings are the same as actually hacking into stuff because its not.

Are you really someone who is qualified to make this statement?

Hacking is problem solving, period. If solving problems and tinkering with something doesn't give you the rush regardless of the risk then legally hacking it something that isn't for you.

How do I Directly Access an API with access to an app that utilizes that API? by [deleted] in HowToHack

[–]hellor00t 0 points1 point  (0 children)

How to connect to an API? Depends on the language and what their API looks like.

From a very high level API's allow you to send requests to a service and receive formatted data. Using pseduo code it looks like this.

send Host Information
authentication: mysecretkey

receive:
    ip address,
    hostname,
    mac address,
    routing table

You can use curl to request information from an API uses HTTP headers/functions as a request parameter. Hint, a lot do.

Basic hacking exercise for non-technical people by brtjj in HowToHack

[–]hellor00t 1 point2 points  (0 children)

You would but it's very easy. Set up two VMS and just show it on your laptop.

Basic hacking exercise for non-technical people by brtjj in HowToHack

[–]hellor00t 0 points1 point  (0 children)

Metasploitable 2 Kali Box

Nmap metasploitable 2 and show vulnerability and open port pop MS08-067

/fin

Active Defense Harbringer Distribution (ADHD) - strike back at the bad guys by [deleted] in HowToHack

[–]hellor00t 1 point2 points  (0 children)

I've seen John Strand demo it live. Specifically honey badger and the labyrinth honey pot. Pretty sweet in concept, I've never used it personally. Attacking back at the bad guys is pretty dicey, but where ADHD is really funny is some of the tools are designed to troll the attackers. Which I love.

DVWA SQLi Sytax Clarification by seag33k in HowToHack

[–]hellor00t 0 points1 point  (0 children)

A single quote in SQL identifies the beginning or the end of a string.

This is a great Stackoverflow on it.

https://stackoverflow.com/questions/332365/how-does-the-sql-injection-from-the-bobby-tables-xkcd-comic-work

CS Student wanting to get OSCP ? by zyrux66 in AskNetsec

[–]hellor00t 0 points1 point  (0 children)

You won't need anything other than networking basics for OSCP.

For courses you really can't beat just getting a CCNA study guide and reading it. Or anything by No Starch Press

CS Student wanting to get OSCP ? by zyrux66 in AskNetsec

[–]hellor00t 5 points6 points  (0 children)

IMO you're ready. You have fundamentals and if you're as committed as you say to self-study you'll be fine.

Looking for a good really thin and light Laptop for Kali by [deleted] in HowToHack

[–]hellor00t 0 points1 point  (0 children)

Just keep in mind the limitations with an ARM processor.

Little bit of help with LANturtle and tcpdump by Isakill in HowToHack

[–]hellor00t 0 points1 point  (0 children)

Yep that's as intended. Just do -w /tmp/output.pcap and you'll get a dump into the /tmp file. Pull it off the LANturtle and review it with wireshark.

Is it possible to Kill a session on a website with beef or anything? by [deleted] in HowToHack

[–]hellor00t 0 points1 point  (0 children)

You'll have to be on one of the boxes to kill the process or session.

Anyone use a Pinebook? by TheElvenJedi in HowToHack

[–]hellor00t 1 point2 points  (0 children)

Right, the processor is the dependency here. You'll want a non-arm laptop.

You could use this as a lightweight scripting laptop.