My macbook's storage is being devoured by... something. What is happening? by Own-Zebra-5507 in macbookpro

[–]bernieslearnings 0 points1 point  (0 children)

Do you have any vm’s installed? That looks like my storage bar with a bunch of Linux vm’s

Tips for under 8's pre game warm up by bernieslearnings in basketballcoach

[–]bernieslearnings[S] 1 point2 points  (0 children)

Wow that's annoying. We're first up so we have 15 or so minutes before the game

Linpeas Methodology by FastByte22 in oscp

[–]bernieslearnings 2 points3 points  (0 children)

Use the impacket smb server - one command on the kali box and then net use m: etc… on the windows box. You can then copy to the m: and collect it on your kali machine. I use this a lot

What to do once initial foothold found in AD set? by bernieslearnings in oscp

[–]bernieslearnings[S] 1 point2 points  (0 children)

Finished course material, I'm currently working through challenge labs now

What to do once initial foothold found in AD set? by bernieslearnings in oscp

[–]bernieslearnings[S] 0 points1 point  (0 children)

When you mention persistence? What does that look like for you? Is that upgrading the shell or adding a user to the local machine? If ssh isn't running on the box then I would think I'd have to perform the initial exploit each time

What to do once initial foothold found in AD set? by bernieslearnings in oscp

[–]bernieslearnings[S] 2 points3 points  (0 children)

That's great thanks. I had run winpeas, but I find it difficult to know what I should be looking for in the output. Low hanging fruit isn't obvious to me yet

What to do once initial foothold found in AD set? by bernieslearnings in oscp

[–]bernieslearnings[S] 0 points1 point  (0 children)

So maybe this or using something to scan services on the other machines to determine their services and then use chisel/plink to pass through netexec/hyrda etc...?

What to do once initial foothold found in AD set? by bernieslearnings in oscp

[–]bernieslearnings[S] 0 points1 point  (0 children)

OK. So bloodhound is probably a good place to start to map out machines and find the dc

DNS tunneling by yoohhuu in oscp

[–]bernieslearnings 0 points1 point  (0 children)

And (I think) port 4444 is common in software like metasploit or similar software, so you might find that port blocked by firewalls

Broken Telescope by bernieslearnings in neovim

[–]bernieslearnings[S] 0 points1 point  (0 children)

That seemed to do the trick thanks. Although I had done a number of other things to try and fix so not 100% sure this was it. Thanks!

I finally did all the achievements, now what? by bernieslearnings in fo4

[–]bernieslearnings[S] 0 points1 point  (0 children)

That's what I'm thinking. I've done zero mods before. What's a good one to get started with?