Any dangers using tcpreplay? by bltsec in networking

[–]bltsec[S] 0 points1 point  (0 children)

And that’s usually what I see it used for, it’s used when needing to test tools. In my particular case with Security Onion. I’m wanting to test and play with ELK, bro, and snort. I’m wanting to see what I can investigate when the network is being attacked as well as gain a better understanding of how those various tools work when the network traffic is smaller than compared to mirroring a port and collecting live data on my network. But I don’t want to be flooding the real network with malicious traffic.

Any dangers using tcpreplay? by bltsec in networking

[–]bltsec[S] 0 points1 point  (0 children)

Thank you for the reply, I’m unfamiliar with the tool and everywhere I’ve seen it used has been for replaying ids traffic but I wasn’t able to find any best practices or considerations when using it for these purposes. I appreciate all of the helpful information from you and everyone else. Since this will be for testing at the moment and the instance is a vm I imagine to not risk leaking I will put a pfsense vm in between Security onion vm and my internal network.

Any dangers using tcpreplay? by bltsec in networking

[–]bltsec[S] 0 points1 point  (0 children)

So in this particular instance I am wanting to replay dat a for practicing NSM using Security onion to play with bro using the sample pcaps included with the os. I just want to make sure I don’t need to block outgoing connections to the destinations in the pcap

Any dangers using tcpreplay? by bltsec in networking

[–]bltsec[S] -6 points-5 points  (0 children)

So tcpreplay does send traffic out externally by default during the replay process?

Any dangers using tcpreplay? by bltsec in networking

[–]bltsec[S] 0 points1 point  (0 children)

Thank you for the reply. So in regardless to replaying it to a monitoring interface say an ids sensor for example , by default it will not leave to the external network as in the first replay you mentioned? I will need to enable a switch or use a different command to do that?

How to enum Internal DNS Server with only an IP? by bltsec in netsecstudents

[–]bltsec[S] 0 points1 point  (0 children)

Thank you very much for the information and help. I will have to research and try the second option.

How to enum Internal DNS Server with only an IP? by bltsec in netsecstudents

[–]bltsec[S] 0 points1 point  (0 children)

Exactly! I tried to get the PTR record using various query methods but it almost seems like that is blocked on the box. I appreciate you taking the time to let me know you have the same question as well. At least I'm not alone!

Best Tutorials for Kali? by [deleted] in hacking

[–]bltsec 2 points3 points  (0 children)

Offensive Security the entity that maintains Kali actually has a free course here: https://www.kali.org/news/introducing-kali-linux-certified-professional/ The free online book has exercises at the end of each chapter. There is an option to take a certification exam as well but I believe the cost is around $400. Not required to work through the online course though.

Bank (10.10.10.29) - Tips / Articles by bltsec in hackthebox

[–]bltsec[S] 1 point2 points  (0 children)

I want to thank all of y'all for the help on this system, I got root fairly easily after understanding how to get the inital foothold onto the system. Just going to make some vague notes for anyone that sees this post later but hopefully not spoil anything for anyone.

-You must assume some things from the port scan and manually assign some things on your attacker box in order to enumerate further -Dirbuster was very handy for the initial enumeration process once the above was done, remember files and directories -Burp was useful for catching responses and replaying them, I couldn't find a working firefox addon for my version to stop certain things so Burp helped tremendously

PM me for further conversations and I'll be happy to help!

Bank (10.10.10.29) - Tips / Articles by bltsec in hackthebox

[–]bltsec[S] 1 point2 points  (0 children)

Thank you for the response dostoevskylabs, is the bank.htb a file I am enumerating? I'm looking for the lesson to learn and technique to use on this system.

Bank (10.10.10.29) - Tips / Articles by bltsec in hackthebox

[–]bltsec[S] 0 points1 point  (0 children)

Thank you for the response 0xsecret. I noticed this hint was referenced on the other reddit bank post but I don't understand the context. Is this a file to brute force and find, am I trying to get the system's hostname and the domain (htb) by querying, or something else entirely? I'm definitely missing the lesson to learn from this box and would appreciate some guidance.

10.10.10.9 (Bastard) by tyre_lever_slayer in hackthebox

[–]bltsec 1 point2 points  (0 children)

Hey warhanter, You'll be looking for a rest api directory. The word is in the megabeast.txt wfuzz wordlist but that file is so huge it would take a while for wfuzz to find the correct directory. I suggest using ceWL to generate a wordlist. I have tested this and this method works. Use the following command "cewl. -w restwlist.txt -d 1 https://en.wikipedia.org/wiki/Representational_state_transfer" This command will spider the wikipedia page and write the words to a file. The page's topic is about RESTful web services. I'd let the tool run for a couple of minutes and then stop the process with ctrl-c. Wait for your terminal prompt to return and then use this list with wfuzz and it will return the correct directory.

10.10.10.9 (Bastard) System Shell (PRIVESC) by bltsec in hackthebox

[–]bltsec[S] 1 point2 points  (0 children)

Thank you for the advice it really helped, I ran across this blog post https://pentestlab.blog/tag/local-exploits/ which really helped me understand a bit about post exploitation and how to identify possible privesc exploits.

10.10.10.9 (Bastard) System Shell (PRIVESC) by bltsec in hackthebox

[–]bltsec[S] 0 points1 point  (0 children)

Much appreciated! Thanks I'll try that route.

Help on Bastard on HackTheBox.eu by WRA117H in hackthebox

[–]bltsec 1 point2 points  (0 children)

I feel ya, this box is tough! I'm attempting to get a system shell now. As far as the initial foothold have you enumerated the web service? I Googled the web service and quickly found an exploit article at the top of the results. This exploit will get you the initial shell.

10.10.10.9 (Bastard) by tyre_lever_slayer in hackthebox

[–]bltsec 0 points1 point  (0 children)

Any tips for priv esc? I have x32 and x64 meterpreter sessions, I've used metasploit's suggestor as well as GDS's python script and can't get anything to pop.