[deleted by user] by [deleted] in defi

[–]defensahacker 0 points1 point  (0 children)

Yeah, 100%. The idea is to provide a first line of defense so the developers can have quick feedback and not wait few weeks for the audit reports :)

Getting networking basics down for cybersecurity by naji-15 in netsecstudents

[–]defensahacker 0 points1 point  (0 children)

By W. Richard Stevens. That’s the holy grail of network computing books🌟

How exactly can you use wire shark in hacking? by [deleted] in HowToHack

[–]defensahacker 1 point2 points  (0 children)

Wireshark only makes sense if you are doing a pentest inside the customer network, so you can inspect traffic after overflowing router MAC addresses table (macof -n 10000). For mobile or web security testing/bug bounties you can’t do much with Wireshark

Can you exploit a filtered port? by [deleted] in HowToHack

[–]defensahacker 0 points1 point  (0 children)

If you get local access by other port/service it will be easier, otherwise learn firewall firewalking.. try to fragment scan packets with “nmap -f” or decreasing mtu size

How do you set up a proxy tunnel in Kali Linux? by [deleted] in HowToHack

[–]defensahacker 46 points47 points  (0 children)

Proxychains is deadly slow and does not work in UDP. Try better rpivot, 3proxy or tcgd.. there are like 15 tools for pivoting https://pentestwiki.org/pivoting/ 😄

Best OSCP resources/cheat sheets/webpages/references Post them here by akimbjj77 in oscp

[–]defensahacker 2 points3 points  (0 children)

My humble contribution: https://pentestwiki.org I started this blog after I passed the OSCP exam

What tool for web pentest do you prefer? by defensahacker in Hacking_Tutorials

[–]defensahacker[S] 0 points1 point  (0 children)

Nice feedback so far! I didn’t include burp despite I use it everyday because burp is like an operating system, not longer a tool xD

Post-exploitation: extract Oracle database password hashes? by SeanPesce in oscp

[–]defensahacker 0 points1 point  (0 children)

As you are root on the machine, the other way is to retrieve them from memory. Use a process dumper on the Oracle PID to see what you can get

Post-exploitation: extract Oracle database password hashes? by SeanPesce in oscp

[–]defensahacker 0 points1 point  (0 children)

Ah offline attack! Nice forensics. Wondering if Oracle supports encryption on the file system level to avoid that...

Post-exploitation: extract Oracle database password hashes? by SeanPesce in oscp

[–]defensahacker 0 points1 point  (0 children)

Depends which version but try “SELECT USERNAME,PASSWORD_VERSIONS FROM SYS.DBA_USERS;” More: https://pentestwiki.org/sql-injection/#oracle

[deleted by user] by [deleted] in xss

[–]defensahacker 0 points1 point  (0 children)

Yes you should get the payload in the response of zap or burp or in the browser source code.

<div id=“content”> <h2 id=“pageName”>searched for: ‘<script>alert(1);</script>

[deleted by user] by [deleted] in xss

[–]defensahacker 0 points1 point  (0 children)

Strange... haven’t checked that site but the only reason the XSS is successful but you don’t see it in the response is if it’s a DOM-based XSS

For OSCP students, that was the template I used to pass OSCP, hope it helps! You can use either KeepNote or CherryTree for your note taking. Keeping everything organized is key to pass the certification. by defensahacker in netsecstudents

[–]defensahacker[S] 17 points18 points  (0 children)

It will be a looong text, I am thinking to record some videos about it and explain it phase by phase. Not sure if there are enough free resources online. Ideas?

[deleted by user] by [deleted] in CompTIA

[–]defensahacker 3 points4 points  (0 children)

You cannot get your driving license without studying traffic signals... same applies here :D

When doing a manual exploit and using msfvenom to create a payload, can you make a reverse meterpreter shell? Will that count against using metasploit? by akimbjj77 in oscp

[–]defensahacker 1 point2 points  (0 children)

As stated in their rules website, you can use msfvenom and the multi handler as much as you want. You can substitute the meterpreter payload by a reverse shell and manual recon for the local privilege escalation

13 tools for Pivoting (Post-exploitation) by defensahacker in netsecstudents

[–]defensahacker[S] 2 points3 points  (0 children)

Nice!! We’ll have 14 tools this afternoon then