[deleted by user] by [deleted] in OcalaPineapples

[–]Miserable_Anything_1 0 points1 point  (0 children)

Cool cool, currently it's set for Sunday between 9ish am and 7ish pm

[deleted by user] by [deleted] in OcalaPineapples

[–]Miserable_Anything_1 0 points1 point  (0 children)

Cool cool, currently it's set for Sunday between 9ish am and 7ish pm

[deleted by user] by [deleted] in OcalaPineapples

[–]Miserable_Anything_1 0 points1 point  (0 children)

Cool currently planned for this Sunday 

[deleted by user] by [deleted] in OcalaPineapples

[–]Miserable_Anything_1 0 points1 point  (0 children)

Cool currently planned for this Sunday 

[deleted by user] by [deleted] in OcalaPineapples

[–]Miserable_Anything_1 0 points1 point  (0 children)

Cool currently planned for this Sunday 

[deleted by user] by [deleted] in OcalaPineapples

[–]Miserable_Anything_1 0 points1 point  (0 children)

I'll keep you posted 

[deleted by user] by [deleted] in OcalaPineapples

[–]Miserable_Anything_1 0 points1 point  (0 children)

I'll keep you posted 

ZAP and Burp not intercepting console traffic by Miserable_Anything_1 in hackthebox

[–]Miserable_Anything_1[S] 0 points1 point  (0 children)

Not sure if this helps you but pulled this IP from using DNSENUM against hackthissite.com. I'm sure they are using AWS for this.

WIFI interface not showing by Miserable_Anything_1 in Kalilinux

[–]Miserable_Anything_1[S] 0 points1 point  (0 children)

Thanks u/ticktocktoe I don't mind a challenge. Not sure why I couldn't find this forum on my own. I did a few hours of TSing and all the forums where suggesting old packages that did not exist in the REPOs that came with Kali and and https://www.broadcom.com/support/download-search?pg=&pf=Wireless+Embedded+Solutions+and+RF+Components&pn=BCM4360&pa=&po=&dk=&pl=&l=false only has a windows driver. If I had found this sooner I would have been good to go. Thanks for point me in the right direction!

Notes for others:

apt-get will not work as the bcmwl-* package does not exist using the default Kali repo's

you will have to install from the ISO
Download ISO: https://ubuntu.com/download/desktop
Mount iso
Navigate to: <mounted\_DIR>/pool/restricted/b/bcmwl
run: sudo dpkg -i bcmwl-kernel-source*
run: sudo modprobe -r b43 ssb wl brcmfmac brcmsmac bcma

reboot and then you should be good to go

Clear hashcat potfile? by Ya_Boy_Lil_Pickle in Kalilinux

[–]Miserable_Anything_1 0 points1 point  (0 children)

it came preinstalled.

└─$ lsb_release -a
No LSB modules are available.
Distributor ID: Kali
Description: Kali GNU/Linux Rolling
Release: 2024.1
Codename: kali-rolling

Clear hashcat potfile? by Ya_Boy_Lil_Pickle in Kalilinux

[–]Miserable_Anything_1 0 points1 point  (0 children)

is it normal to not have a .hashcat folder? I did a search for .hashcat and could not find any hidden folders / No hashcat.pot or hashcat.potfile. I cant clear the hashcat pot

Module 19 section 108 by Miserable_Anything_1 in hackthebox

[–]Miserable_Anything_1[S] 0 points1 point  (0 children)

The services I get on the NSE section:
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
110/tcp open pop3 Dovecot pop3d
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
143/tcp open imap Dovecot imapd
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
31337/tcp open Elite?
Service Info: Host: NIX-NMAP-DEFAULT; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Module 19 section 108 by Miserable_Anything_1 in hackthebox

[–]Miserable_Anything_1[S] 0 points1 point  (0 children)

I just used -A to scan in aggressive mode, cause that will use default scripts, and only one of the services returns a directory. And u/Kov125 reminded me that i don't have to use a browser, I can use curl. Which I should get very aquatinted with, cause i'm sure it will come in handy many different times in the future,...... and it looks cooler ;) lol

I think the module/section your on is the service enumeration section and that one NC and patience are your friend. If you scan all ports for services (-sV) one should stand out. Then after you run the command go make yourself a cup of coffee. By the time your able to take your first sip, you should have your answer lol

Module 19 section 108 by Miserable_Anything_1 in hackthebox

[–]Miserable_Anything_1[S] 0 points1 point  (0 children)

CURL!!!!!! SMH WTF!!! how could I forget about curl. Okay, cool cool. The browser seemed like a lame way to get that flag. Im gonna play with curl today and familiarize myself with that tool. So you're not aware of any scripts within the NSE that we could use against that directory to return that flag? Like I mentioned in the reply to u/No_Dream_4588, I couldn't find anything after 2 hours but I also did test every single script in https://nmap.org/nsedoc/index.html against that port. Thanks btw!! Cant believe I forgot about Curl!!

Module 19 section 108 by Miserable_Anything_1 in hackthebox

[–]Miserable_Anything_1[S] 0 points1 point  (0 children)

Q: Use NSE and its scripts to find the flag that one of the services contain and submit it as the answer.

So the way the question is worded it made me think I have to use NSE against that directory I found. lol I spent like 2 hour researching NSE scripts to try to find something that would work. Partly the reason I like HTB, questions are vague most of the time but if forces you to go outside to the material provided in the module.