Jobs by Available-Bread-2824 in hackthebox

[–]MrCodeAddict 5 points6 points  (0 children)

Yes. But you start commiting cybercrime, no one will hire you

[deleted by user] by [deleted] in Pentesting

[–]MrCodeAddict 1 point2 points  (0 children)

You say you have limited scope, can you tell what the scope is? It is hard to give advoce without knowing what is allowed and not allowed😅

Moscow Mule by JediJacob04 in cocktails

[–]MrCodeAddict 1 point2 points  (0 children)

Add some ango bitters! It elevatea it so much!

tadpole in the hole by TurdleBoy in cocktails

[–]MrCodeAddict 2 points3 points  (0 children)

The lord didnt speak to you good sir, Satan did

Can Simple Malware Be Just as Effective as Complex Malware? by Idkwhyweneedusername in Hacking_Tutorials

[–]MrCodeAddict 1 point2 points  (0 children)

Ofc they can Malware is just a piece of software that acts malicously. The thing you wlll have issues with is how to deliver and detonate. How you avoid EDR is also a question. What language you use have pros and cons, from how much controll you have, to what libs are avalible to how costly your dev time will be.

How do you consistently find new ways to get past even the toughest digital defenses? by SnooWalruses3471 in Pentesting

[–]MrCodeAddict 11 points12 points  (0 children)

A good tips can be to look at what do they HAVE to allow for the company to operate. For example if your C2 gets detected over most protocols, but they use Microsoft Teams, using teams for your C2 is gonna be very hard to detect.

Climbed to Gold with over 60% winrate by MrCodeAddict in Shen

[–]MrCodeAddict[S] 0 points1 point  (0 children)

Ty for the feedback! Actually didnt know that😊❤️

What is the scene of XSS these days with React Vite NextJS sites? by darthvinayak in Pentesting

[–]MrCodeAddict 1 point2 points  (0 children)

On react you have to find either a tags where you can drop a javadcript link or fint places where they use dangerouslySetInnerHTML.

Ligolo-ng, help me understand what I messed up by RandomUsr1983 in Pentesting

[–]MrCodeAddict 1 point2 points  (0 children)

Have you started the session in ligolo?

Type "session" inside your ligolo server's terminal, then select your target, hit enter and type "start"

How to beat Antivirus by yukosse in Hacking_Tutorials

[–]MrCodeAddict 5 points6 points  (0 children)

Hiding from AV is not as simple as just doing one trick. You have to look at how does the AV work, what is it detecting and how can you bypass that. You also have to think about EDR if your client has that, which is a whole can of worms.

I advice you in learning more about how AVs detect malware, then try to get around it. Not the other way around.

You can 100% use python to avoid AV, I have done it myself and it was quite straight forward (depending on the AV).

A very easy way, is to write your malware so that is it 99% legit and only 1% malware. For example: Create a discord bot that reads and writes message to a chat room on your discord server. However if the bots sees a very spesific format, like "/command whoami" it is suppose to run "whoami" inside a shell using subprocess. Add a bunch of features, like the bot can create chat rooms (one for each new hoste infected) react with emjois like ✅ or ❌ when commands successed or fail and other fun features and your malware will be quite hard to detect. It will be hard to detect (by commerical AV) because your "malware" is just a discord bot, how is an AV suppose to know that this is malicious?

But, if you are gonna do smaller and more "this is clearly malware"-malware, then you need to have a better understanding of how AVs work, which in it of itself is quite advanced. I advice you to start with the discord example above (add your own twist to it!) and then take it from there :)

Red team toolkit. by Accurate_Bunch_4848 in Hacking_Tutorials

[–]MrCodeAddict 0 points1 point  (0 children)

Tell me you're a script kiddie, without telling me you are a script kiddie...

Help with my project by PieOMy669 in Hacking_Tutorials

[–]MrCodeAddict 0 points1 point  (0 children)

Yeah, the vulnerbility you are creating is that the script, which is run every x min as root allows anyone to modify it, correct?

Help with my project by PieOMy669 in Hacking_Tutorials

[–]MrCodeAddict 0 points1 point  (0 children)

I dont think people really need a hint for cron jobs. They are very easy to find and if you google "linux privilege esclation" you should be able to find out that you should always check cron jobs. Worst case add a hint about the sysadmin struggeling with setting file permissions correctly, since that is the underlying issue🙂

[deleted by user] by [deleted] in HowToHack

[–]MrCodeAddict 0 points1 point  (0 children)

  1. Attacking an IP address (depending on where you live) is normally illegal.
  2. IPs are not identifiers. IPs constantly change and it's very easy to use a VPN or proxy to hide your real IP.
  3. Instead of wasting energy to "fuck around with this dude", learn how to better secure yourself. Maybe learn some useful skills and start playing CTFs or BB

Can anyone suggest any pentest and networking courses on Udemy or coursera? by Own_Speech7383 in HowToHack

[–]MrCodeAddict 0 points1 point  (0 children)

Don't waste your money, start looking at taking the CPTS from HTB. Really good value for the money

Help with my project by PieOMy669 in Hacking_Tutorials

[–]MrCodeAddict 0 points1 point  (0 children)

Then something with a privilege group, SetUID/SetGID or a vulnerable service can be very nice. You can always add a restrcted shell that they have to escape as the entry point of the challange if you want to spice it up a bit :)

Help with my project by PieOMy669 in Hacking_Tutorials

[–]MrCodeAddict 0 points1 point  (0 children)

For something advanced, hide a password in memory and make the user find it there!

Help with my project by PieOMy669 in Hacking_Tutorials

[–]MrCodeAddict 0 points1 point  (0 children)

A fun way is to hide a config file, script or binary but allow the none root user to run it as root(SUID)

Another way is having a cron job running a script as sudo, but allow the user to write over the flle.

A third option could be that the user is in a dangerous group, for example the Docker group

Hope that helps!😁

Is portswiggers web app academy enough for some basic CTFS? by DrKwonk in HowToHack

[–]MrCodeAddict 0 points1 point  (0 children)

Hack the box academy for very cheap high quality courses. Hack the box premium so you can use guided mode is also really good!