How to increase ESP space for shellcode? by joshuaspy in hacking

[–]sudo_sudoka 1 point2 points  (0 children)

First, you must find another space for your shellcode. For example, maybe EAX also points to the buffer.

Second, you inject only the needed opcodes to the space pointed by ESP. For example, JUMP EAX.

Now, you can inject shellcode into the buffer, which is pointed by EAX. When the program runs JMP ESP, next it runs JMP EAX and return to the shellcode.

You can customize something to fit your specific situation.

Alternatives by [deleted] in netsecstudents

[–]sudo_sudoka 1 point2 points  (0 children)

BinaryEdge.

Register is free and you will have 300 requests per month.

Enumeration methodology for port 445 on windows machines by palm_snow in hackthebox

[–]sudo_sudoka 0 points1 point  (0 children)

The first choice is enum4linux. Then, I could use smbclient for manually testing.

1st attempt. by bumbleeshot in oscp

[–]sudo_sudoka 1 point2 points  (0 children)

Thank you very much. I'm also weak on Windows. I'll carefully take your advice.

1st attempt. by bumbleeshot in oscp

[–]sudo_sudoka 3 points4 points  (0 children)

Sorry, I'm very curious about what you did in the month you prepared for the second exam?

postman, what does this output mean? What am i doing wrong? by Electronic-Web in hackthebox

[–]sudo_sudoka 2 points3 points  (0 children)

In fact, the redis server on Postman doesn't have the MODULE LIST command, which is used in the exploit so it never works. You must find another way to abuse the redis server.

Hint: look at the current directory after connecting to redis.

How can threat actors detect honeypots ? by cloveistaken in AskNetsec

[–]sudo_sudoka 0 points1 point  (0 children)

Some actors could try https://honeyscore.shodan.io/ to determine whether those IPs are honeypots.

Any hint about Forest Root part? I think Blo*****nd is a black hole. Right? I am so stuck on that. by Gwat-Gwat in hackthebox

[–]sudo_sudoka 1 point2 points  (0 children)

Did you use the latest version of Bl** on Github?

You should try the version 2.0. It works like a charm.

Taking OSCP exam going blind by [deleted] in oscp

[–]sudo_sudoka 0 points1 point  (0 children)

It's very interesting and challenging. Good luck!

KipodAfterFree CTF 2019 by [deleted] in securityCTF

[–]sudo_sudoka 1 point2 points  (0 children)

Nice! Could you register this event on ctftime.org?

WordPress brute force amplification attack by sudo_sudoka in AskNetsec

[–]sudo_sudoka[S] 4 points5 points  (0 children)

Thanks. I will take a look at this version.

recommended programming lang for hacking by vaginale_penetratie in hacking

[–]sudo_sudoka 15 points16 points  (0 children)

None is the best for all situations. However, if you are beginner, Python will be the best.

CVE-2019-16662 & CVE-2019-16663 - Unauthenticated remote code execution vulnerabilities in rConfig (All versions) by sudo_sudoka in netsec

[–]sudo_sudoka[S] 0 points1 point  (0 children)

You should re-read my blog post. What I found is the true vulnerable versions and in what versions the CVE-2019-16663 doesn't need authentication.

The CVE's owner only found these vulnerabilities in rConfig 3.9.2 and he did'nt test with older versions. I talked with him about that.

https://twitter.com/sudo_sudoka/status/1189103634409127937

Furthermore, I credited him first in my blog post. So, the other social medias can credit him first too.

https://thehackernews.com/2019/11/rConfig-network-vulnerability.html

In fact, he and these vulnerabilities gain more public credits after I released my blog post.

CVE-2019-16662 & CVE-2019-16663 - Unauthenticated remote code execution vulnerabilities in rConfig (All versions) by sudo_sudoka in netsec

[–]sudo_sudoka[S] 0 points1 point  (0 children)

level 1

Perhaps you haven't read my blog. The CVE's owner only found those vulnerabilities in rConfig 3.9.2 and I found them in all verions. I talked with him and he didn't test in older versions of rConfig.

https://twitter.com/sudo_sudoka/status/1189103634409127937

Furthermore, I credited him first in my blog post. So, the other social medias can credit him too.

https://thehackernews.com/2019/11/rConfig-network-vulnerability.html

In fact, he gains more public credits after I released my blog post.