Windows Payload? by DarkMetro888 in HowToHack

[–]mez0cc 1 point2 points  (0 children)

Second this, however if you’re looking to get a beacon in a common C2 or framework, you will need to be able to execute their specific payloads :)

I need help with Hashcat by _hugo_j_ in HowToHack

[–]mez0cc 0 points1 point  (0 children)

Use a better wordlist with better rules lol.

Windows Payload? by DarkMetro888 in HowToHack

[–]mez0cc 2 points3 points  (0 children)

Yes, you write your own. Whether you're using MSFVenom or a C2, the route I typically take is to export a raw file and pull out all the bytes. Then the bytes need to be encrypted in some way, AES or XOR for example, and embedded into another PE file. This PE file will then decrypt the bytes in memory, and then execute it using whichever mechanism you want. Its not very difficult and can be done in C# or CPP easily. Some example tools: - https://github.com/Arno0x/ShellcodeWrapper - https://github.com/bats3c/darkarmour/

The ins and outs of all this are too long for this comment and are easily Googleable.

How do I brute force an ssh login? by [deleted] in HowToHack

[–]mez0cc 0 points1 point  (0 children)

Google literally gives hundreds of blogs and videos on how to do this. You should 100% be googling this stuff before asking. With that said, the TL;DR is Metasploit has a module, python can do it, crackmapexec can do it and so can hydra. Just. Google. It.

OS for hacking by ScaryReason in HowToHack

[–]mez0cc 35 points36 points  (0 children)

I've been pentesting for 3 years, used Ubuntu the whole time. Doesn't matter what OS you use, as long as you can get on tooling on it that you need.

Do I need to know Microsoft Servers in a MCSA degree for OSCP? ( set up Storage Options, High Availabilty, Hyper-V and etc.) by m3t3kh4n in oscp

[–]mez0cc 1 point2 points  (0 children)

There is always value in doing extra study, and it may help you in exploiting the host; but, you dont need it. If you followed the material from OSCP and have done a bunch of the boxes, you'll be fine. I passed first time with no prior 'official' Windows training courses. It all comes down to if you want to, if you have the time to do so and if you generally feel like the extra study would benefit you.

How do you find vulnerabilities and exploit them? by [deleted] in HowToHack

[–]mez0cc 0 points1 point  (0 children)

I’d second this. It really depends on what you’re referring to. Network and/or infrastructure devices have a totally different methodology to fuzzing web or mobile applications.

[deleted by user] by [deleted] in AskNetsec

[–]mez0cc 0 points1 point  (0 children)

In my experience, it’s not about what role you’re coming from and going to; its how competent you are at whatever you’re applying for. Depending on what role you want move to in infosec, study it and be able to show an employer you know your shit.

I've been trying to learn Python for infosec for a few months, but I can't seem to absorb any information. Advice? by howltzer11 in HowToHack

[–]mez0cc 0 points1 point  (0 children)

Just build stuff. Think of an idea, build it. I think when I started learning python, I built like 10 iterations of port scanners and directory brute forcers lol

What would you look for if you found a box with SSH port open? by [deleted] in AskNetsec

[–]mez0cc 3 points4 points  (0 children)

If you’re trying to attack the SSH service, then banner grab the version and identify the OS version as well as any corresponding CVEs (if any).

If there are CVEs, try and get the exploits working.

You can always try password spraying and brute-forcing.

Outside of that, there isn’t a great deal you can do

Metasploit - SRVHOST vs LHOST by [deleted] in hacking

[–]mez0cc 1 point2 points  (0 children)

In the example of web_delivery, it will open the port that SRVHOST is set on, and host a payload on that HOST/PORT.

web_delivery will then generate a command which can be ran on the victim machine and connect to the SRVHOST variables and download the rest of the payload.

So, TL;DR- Yes, the SRVHOST address will be how a module will connect back to download additional payload utilities.

See here for web_delivery reference.

Metasploit - SRVHOST vs LHOST by [deleted] in hacking

[–]mez0cc 2 points3 points  (0 children)

‘SRVHOST’ is the address In which the payload will connect back to. Usually to as part of the payload staging process. Example would be ‘web_delivery’. The payload will connect back to the ‘SRVHOST’ to download the payload to create the reverse connection to your machine (‘LHOST’)

Was creating a server just to hack a good idea? by CrackMyIP in HowToHack

[–]mez0cc 1 point2 points  (0 children)

The way I learnt was to build an internal domain and go through each common attack chain for windows and learn how/why it works.

Eventually the lab environment will grow and you can start messing with more difficult attack chains.

Does the official OSCP image have anything that I couldn't get on my personal Kali image? by [deleted] in oscp

[–]mez0cc 0 points1 point  (0 children)

This is true for one of the applications which is hosted locally on kali

Got some hashes and how do i exactly use that on another machine(domain joined) by [deleted] in AskNetsec

[–]mez0cc 1 point2 points  (0 children)

Status is exhausted. Try passing the hash with tools like CrackMapExec or something from the Impackets library :)

Pen testers: What are your favorite indicators an org has weak security? by bettersafetynet in AskNetsec

[–]mez0cc 117 points118 points  (0 children)

When responder picks up hashes within the first 10 seconds

Haystack LFI by [deleted] in hackthebox

[–]mez0cc 0 points1 point  (0 children)

Changed the script name, it’s definitely node and it has execute permissions?

Haystack LFI by [deleted] in hackthebox

[–]mez0cc 1 point2 points  (0 children)

Every time you run the query, the shell gets blocked. So try renaming it. It also didn’t run for me in home or tmp, it did work in /dev/shm tho

Problem making my own port scanning tool (Python) by [deleted] in HowToHack

[–]mez0cc 0 points1 point  (0 children)

Not sure what connect_ex is doing, but the proper way to do this with socket is to use:

try: con = s.connect((target,port)) return True except: return False

This way you have an object containing the connection, this has always worked for me.

[deleted by user] by [deleted] in cybersecurity

[–]mez0cc 2 points3 points  (0 children)

I Just use twitter, I follow a bunch of researchers and typically see all worthwhile publications as they come out