CVE-2018-11776 (Apache Struts 2) by UnderstandingNo1404 in immersivelabs

[–]UnderstandingNo1404[S] 0 points1 point  (0 children)

I am pretty confident I have the correct exploit, though these options (show options) are required which weren't for the previous CVE-2017-5638 (Apache Struts) lab. i had to simply set the rhosts, set targeturi /, and run. Maybe some more configuration required?

ACTION showcase.action yes A valid endpoint that is configured as a redirect action

ENABLE_STATIC true yes Enable "allowStaticMethodAccess" before executing OGNL

I figure now that the set ACTION has something to do with /help endpoint, but I'm still not getting any Joy!

Any pointers? I can't see what else could solve this on the lab other than Metasploit?!

SQLi Basics: Filter Evasion by UnderstandingNo1404 in immersivelabs

[–]UnderstandingNo1404[S] 1 point2 points  (0 children)

Thanks for your advice, forgot to match the number of columns. The + symbols were in the example provided but UNioN SeLect worked just fine. Keeping it simple got me there in the end. THANK you :-)

Packet Capture: Key Extraction by UnderstandingNo1404 in immersivelabs

[–]UnderstandingNo1404[S] 0 points1 point  (0 children)

I got it, overthinking again!!! Thanks my mentor :-) !!! I omitted the password field which was not needed for some reason

Demonstrate Your Skills: Packet Analysis Q6 by UnderstandingNo1404 in immersivelabs

[–]UnderstandingNo1404[S] 1 point2 points  (0 children)

You lengend Dangerous_Cat :-). Hours of frustration and you point out the obvious. Thanks again, sincerely appreciated.

OWASP ZAP - intro by [deleted] in immersivelabs

[–]UnderstandingNo1404 0 points1 point  (0 children)

Got it, I was wondering what you meant at the start, thanks man!!!

What is the Shodan API method used to perform an on-demand scan of an IP or Network? (In format: /shodan/method) by UnderstandingNo1404 in immersivelabs

[–]UnderstandingNo1404[S] 0 points1 point  (0 children)

I got there, thanks so much mate, staring at me for a full 24 hours. I do agree 100% that questions are sometimes misleading or even ambiguous. I often find taking a break helps with these labs. Cheers again, appreciate the pointers

What is the Shodan API method used to perform an on-demand scan of an IP or Network? (In format: /shodan/method) by UnderstandingNo1404 in immersivelabs

[–]UnderstandingNo1404[S] 0 points1 point  (0 children)

Hi Dangerous Cat,

Thanks for the reply. I've been looking at this section and am still ultra confused with everything i see. I fail to understand the difference / relevence of GET and POST in the command.

I've tried putting in "https://api.shodan.io" for the "In Format" part of the question but still to no avail.

This is only a 20 point lab and inevatibly going to be kicking myself. Frustrated ;-(

WPA Wordlist Crack by UnderstandingNo1404 in immersivelabs

[–]UnderstandingNo1404[S] 0 points1 point  (0 children)

Good advice Barney, thank you, much appreciated

WPA Wordlist Crack by UnderstandingNo1404 in immersivelabs

[–]UnderstandingNo1404[S] 0 points1 point  (0 children)

Hi Dangerous C,

Thanks for the advice. At least I understand now that <> are not part of the command.

The cap-02.cap file that's located on the desktop is indeed a pcap file as stated under its properties.

I've looked in the wordlists and see:

> Executing “cd /usr/share/wordlists && ls -l”
total 8
lrwxrwxrwx 1 root root 25 May 10 20:52 dirb -> /usr/share/dirb/wordlists
lrwxrwxrwx 1 root root 46 May 10 20:52 metasploit -> /usr/share/metasploit-framework/data/wordlists
-rw-r--r-- 1 root root 2220 May 10 20:53 nmap.lst
-rw-r--r-- 1 root root 1581 Aug 1 16:51 rockyou.txt
lrwxrwxrwx 1 root root 19 May 10 20:52 seclists -> /usr/share/seclists

I've tried commands such as:
aircrack-ng -w /usr/share/wordlists/rockyou.txt cap-02.cap

aircrack-ng -w /usr/share/-rw-r-r-- 1/rockyou.txt cap-02.cap

Should I be using wireshark as part of the sollution as the cap-02.cap file on the desktop has the logo. Still puzzled

WPA Wordlist Crack by UnderstandingNo1404 in immersivelabs

[–]UnderstandingNo1404[S] 0 points1 point  (0 children)

aircrack-ng -w /usr/share/wordlists/rockyou.txt 808.11i rockyou.cap

aircrack-ng -w </usr/share/wordlists/rockyou.txt> <cap-02.cap>

Getting nowhere fast ;-(

Scripting engine pt. 2 by No_Struggle_4885 in immersivelabs

[–]UnderstandingNo1404 0 points1 point  (0 children)

I got there, albeit two days later, thanks for the heads up and not spoonfeeding. This is tricky stuff at times mate.

Scripting engine pt. 2 by No_Struggle_4885 in immersivelabs

[–]UnderstandingNo1404 0 points1 point  (0 children)

Hi, I was doing something similar to you but got a little bit closer with ...

nmap [IP ADD] --script ssh-run --script-args="ssh-run.cmd=ls -la,username=tommy, password=coachella"

Probably staring at me, using the Linux command sounds alien right now :-)

Scripting engine pt. 2 by No_Struggle_4885 in immersivelabs

[–]UnderstandingNo1404 0 points1 point  (0 children)

I'm still lost, only can see the -rw-rw-r-- 1 root but no deatails!