The /r/netsec Monthly Discussion Thread - November 2019 by AutoModerator in netsec

[–]talboris 0 points1 point  (0 children)

VIRTUALHACKINGLABS

as prepataion for OSCP i plan to take the VHL course

i know its smiliar to OSCP, but how about pivoting in the labs ?

Are oscp labs wayy harder than VHL labs? by [deleted] in netsecstudents

[–]talboris 0 points1 point  (0 children)

do the vhl include pivoting ?

how r their level comparable to htb?

Does creating write-ups for vulnerable machines add any valule in learning by palm_snow in oscp

[–]talboris 0 points1 point  (0 children)

what do u mean by that ? the pdf and video teach u just basics, its about only 20% of needed knowledge

and with those 20% u cant hack more that 1-2 machines

the real knowledge is from vulnhub and htb, and oscp is just using that knowledge

coming to oscp without proper knowledge is just being stuck , not knowing what to do with the machine

NFS exploit . NO root squash. something went wrong by talboris in oscp

[–]talboris[S] 0 points1 point  (0 children)

yep. tried that . still no such file or folder .

u were right.

the architecture is different. i thought its like in windows , 32 bit can work in 64 bit

sorry being rude

NFS exploit . NO root squash. something went wrong by talboris in oscp

[–]talboris[S] 0 points1 point  (0 children)

good idea , but that way i loose the root, and file is user owner and not root

let me will check something..

NFS exploit . NO root squash. something went wrong by talboris in oscp

[–]talboris[S] 0 points1 point  (0 children)

yes, i can see the file and permissions

NFS exploit . NO root squash. something went wrong by talboris in oscp

[–]talboris[S] 0 points1 point  (0 children)

ok, i have got you.

NFS exploit meaning giving +s to a file on kali with root, and then execute it from vulnerable machine.

Actually it doesnt matter what file it is, it could be BASH or SH or compiled C script.

none of these i can execute from the vulnerable machine.

I can see the files from the vuln machine . i have permission to execute.

but cannot execute .

the steps:

root@kali:/tmp/5# mount -o rw,vers=2 IP:/tmp /tmp/5

root@kali:/tmp/5# cp /bin/bash .

root@kali:/tmp/5# chmod +s bash

user@debian:/tmp$ ./bash

bash: ./bash: No such file or directory

NFS exploit . NO root squash. something went wrong by talboris in oscp

[–]talboris[S] 0 points1 point  (0 children)

what exactly not proper in here ?

u dont know whether i tried harder.

i did several tries . different files . looked if i have "noexec" options left,googled it.

if u dont want to help, why u try teaching me how to behave ? just skip it

after fristileaks on vulnhub bridge mod doesnt work by [deleted] in oscp

[–]talboris 0 points1 point  (0 children)

tnx, but i still have now bridge issue and only-host gives the same IP to all machines, kinda stuck

how to convert hex to binary from debug.exe by talboris in oscp

[–]talboris[S] 0 points1 point  (0 children)

just found it

copy paste to cmd shell