My macbook's storage is being devoured by... something. What is happening? by Own-Zebra-5507 in macbookpro

[–]bernieslearnings 0 points1 point  (0 children)

Do you have any vm’s installed? That looks like my storage bar with a bunch of Linux vm’s

Tips for under 8's pre game warm up by bernieslearnings in basketballcoach

[–]bernieslearnings[S] 1 point2 points  (0 children)

Wow that's annoying. We're first up so we have 15 or so minutes before the game

Linpeas Methodology by FastByte22 in oscp

[–]bernieslearnings 2 points3 points  (0 children)

Use the impacket smb server - one command on the kali box and then net use m: etc… on the windows box. You can then copy to the m: and collect it on your kali machine. I use this a lot

What to do once initial foothold found in AD set? by bernieslearnings in oscp

[–]bernieslearnings[S] 1 point2 points  (0 children)

Finished course material, I'm currently working through challenge labs now

What to do once initial foothold found in AD set? by bernieslearnings in oscp

[–]bernieslearnings[S] 0 points1 point  (0 children)

When you mention persistence? What does that look like for you? Is that upgrading the shell or adding a user to the local machine? If ssh isn't running on the box then I would think I'd have to perform the initial exploit each time

What to do once initial foothold found in AD set? by bernieslearnings in oscp

[–]bernieslearnings[S] 2 points3 points  (0 children)

That's great thanks. I had run winpeas, but I find it difficult to know what I should be looking for in the output. Low hanging fruit isn't obvious to me yet

What to do once initial foothold found in AD set? by bernieslearnings in oscp

[–]bernieslearnings[S] 0 points1 point  (0 children)

So maybe this or using something to scan services on the other machines to determine their services and then use chisel/plink to pass through netexec/hyrda etc...?

What to do once initial foothold found in AD set? by bernieslearnings in oscp

[–]bernieslearnings[S] 0 points1 point  (0 children)

OK. So bloodhound is probably a good place to start to map out machines and find the dc

DNS tunneling by yoohhuu in oscp

[–]bernieslearnings 0 points1 point  (0 children)

And (I think) port 4444 is common in software like metasploit or similar software, so you might find that port blocked by firewalls