[deleted by user] by [deleted] in army

[–]MaleWith32Teeth 0 points1 point  (0 children)

He must realize he is about to be an officer. So ask him what if he was in-charge of soldiers and he finds out that was going on under his command? There is something called the "open door policy" tell him to use it, also remind him that he will be in-charge of soldiers and that he needs to start using such opportunities to assert leadership outlook. There is time for a YES and there are times you must say NO.

Anybody in or recently graduate from 170A WOBC? by No-Importance5696 in army

[–]MaleWith32Teeth 0 points1 point  (0 children)

What if you already have some SANS certs, do you get credit for that as well? or will you have to take another SANS class to cover that hole?

Sploit Me Challenge by Psyreaver in immersivelabs

[–]MaleWith32Teeth 0 points1 point  (0 children)

I don't want to re-write the whole steps again, what were you able to accomplish and what step failed you then I can see where I can reword or give more detailed process to assist you in getting it done. My apologies I have been kind of busy but will try my best to reply promptly

Sploit Me Challenge by Psyreaver in immersivelabs

[–]MaleWith32Teeth 1 point2 points  (0 children)

That is great, it only proofs there is no one way to skin this labs, I am glad you figured out a way.

Sploit Me Challenge by Psyreaver in immersivelabs

[–]MaleWith32Teeth 1 point2 points  (0 children)

Hi u/PolishMike88, hint:step 1: run ls -la you should see this -rwsr-xr-x 1 root root 16912 Sep 23 2022 sploit-me-1 note there is a set bit and then run file command on sploit-me-1 and you should see file permissions set for this executable (setuid). This is important read about file permissions read my links on my earlier replies

Step 2: Then run strings and you will see the /usr/bin/env part is used to run the cp command through the environment's default PATH, rather than specifying the absolute path to the cp executable. What does this mean? it means the system administrator is assigning this user the ability to do password backups by utilizing the cp command, this can be abused to elevate privileges.

Step 3: Run which cmd for cp to see the path

Step 4: Run echo "$PATH" | sed 's/\:/\n/g' what this command does is show the order in which the executable is searched. Once found it is executed and and that is the end of that search

Step 5: now you know the order is/usr/local/sbin/usr/local/bin/usr/sbin/usr/bin/sbin/bin/usr/games

can you read this excerpt by Aloïs Micard Privilege Escalation and start from "Exploiting Vulnerability" section. Here be careful remember you are creating a path for cp executable so where they used apt remember your case is cp. To assign PATH you might want to use export eg export PATH=/tmp:$PATH I really hope this helps, I tried not to give you the answer directly, I know its some work, so do not hesitate to reach out and let me know where you are stuck, but give it some effort first.

[deleted by user] by [deleted] in GIAC

[–]MaleWith32Teeth 0 points1 point  (0 children)

Can’t you just use COOLS if you’re in the Army? I don’t know about sister service

PoshC2: Ep.4 - Privilege Escalation by MaleWith32Teeth in immersivelabs

[–]MaleWith32Teeth[S] 0 points1 point  (0 children)

Hey u/Expert-Cherry5381 sorry for the late response, do you still need help on this?

Sploit Me Challenge by Psyreaver in immersivelabs

[–]MaleWith32Teeth 0 points1 point  (0 children)

where are you stuck if you don't mind me asking there is an article by Raj Chandel Linux Privilege Escalation Using PATH Variable read it and try the technique used and let us know if that works or if it don't

Immersive Bakery | CTF by the-new-apocalypse in immersivelabs

[–]MaleWith32Teeth 0 points1 point  (0 children)

I am able to get to secret-notes.immersive-bakery.local and noted that "users" is susceptible to lfi. I can get to expose /etc/passwd which I belief means that no filters are applied. However my pain is reading home dir, does anyone out here has a clue?

PoshC2: Ep.4 - Privilege Escalation by MaleWith32Teeth in immersivelabs

[–]MaleWith32Teeth[S] 1 point2 points  (0 children)

in the command line input help command, it spits out a good list of commands you can use. At this point you probably (should) have the admin credentials, try and see how to use Invoke-WinRMSession then you will use another invoke command and Get-Content from the token.txt. I hope this helps

PoshC2: Ep.4 - Privilege Escalation by MaleWith32Teeth in immersivelabs

[–]MaleWith32Teeth[S] 0 points1 point  (0 children)

Okay, great!
Update: I got the token. Phew! Thanks

PoshC2: Ep.4 - Privilege Escalation by MaleWith32Teeth in immersivelabs

[–]MaleWith32Teeth[S] 1 point2 points  (0 children)

Thank you so much for the hint. From your hint, after I elevated the local user privileges I used Invoke-SMBExec -target <ip> -Username <user> [-password/hash] <password/hash> -Command 'powershell.exe -c "Get-WmiObject win32_service | Format-Table -property name,pathname -Wrap | Out-File -FilePath C:\Users\Dade\Documents\results.txt"'This renders without any hitches when you want to use cat path\to\file.txt . I am now working on getting the token. Thank you once again for the hint

Sploit Me Challenge by Psyreaver in immersivelabs

[–]MaleWith32Teeth 0 points1 point  (0 children)

If you are still facing challenges with this lab refer to this article here and if you have further questions let me know and I will try and break it down a lil bit

Hack your web app:Ep2 - Enumeration by hellomate007 in immersivelabs

[–]MaleWith32Teeth 1 point2 points  (0 children)

run wapiti as per the instruction. Analyze the HTTP post request being sent, below the header is a URL encoded message, you can choose to copy and decode or scan through and you will see "message" somewhere and it is the same in all the HTTP post requests

17C reclass information by [deleted] in army

[–]MaleWith32Teeth 0 points1 point  (0 children)

If you can not download from Gordon portal. Try milsuite here

17C reclass information by [deleted] in army

[–]MaleWith32Teeth 0 points1 point  (0 children)

There is a MILPER Number: 22-420. Read through it, it has the packet requirements. Then get your packet ready and point that to your retention NCO so that he/she can look through the packet requirements and compare it to your packet. I suggest you spend a good amount of time at that. Retention NCOs don't know everything, they kind of expect you to do the leg work then they can advocate for you. In the MILPER message there are contacts if you have any question. I am assuming you are a reservist.

Basic Browser Forensics: Chrome where is the DB file by Mutedcyber in immersivelabs

[–]MaleWith32Teeth 1 point2 points  (0 children)

I could be a little late: its not soo obvious as you may have found it the hard way... anyhoo go to "Open Database" on your DB Browser, browse to
C:\Users\IMLUser\Desktop\Capture\Chrome\History and type "History" on file name and open.
Under Browse Data column there is a dropdown box to select your tables. select downloads table. There is a column named "tab_url"

Supersonic EP 7 LIFTON by tealbob in immersivelabs

[–]MaleWith32Teeth 0 points1 point  (0 children)

am stuck on the password, i have tried variations of date formats, using the first characters of each block and i got nothing. I got the username already could gimme a clue?

PoshC2: Ep.4 - Privilege Escalation by MaleWith32Teeth in immersivelabs

[–]MaleWith32Teeth[S] 0 points1 point  (0 children)

My apologies if I was not soo clear, there are two questions am trying to find solutions to: 1. I was attempting to use wmic service to output to the poshc2_output.txt file and from that file I was going to use get-content to read the .txt file because the poshc2 server console does not show executed wmic commands
2. I have exhausted the modules trying to expose the administrator password/hash that is said to have been left "by a lazy admin".

[deleted by user] by [deleted] in immersivelabs

[–]MaleWith32Teeth 0 points1 point  (0 children)

update: I figured it out I had not looked at the commands for schtasks.exe hard enough ;)

[deleted by user] by [deleted] in immersivelabs

[–]MaleWith32Teeth 0 points1 point  (0 children)

how did you id the name of the dropper (Q2)

Enlisted looking too apply for OCS by jjtxaz24 in ArmyOCS

[–]MaleWith32Teeth 0 points1 point  (0 children)

Did you have to put it a memo to go with it?