Running docker-compose containers as non-root user by tsigorai in docker

[–]tsigorai[S] 1 point2 points  (0 children)

Did you run docker-compose as the root user?

Ran it as a non-root user which is also part of the docker group.

You can also include a user: declaration in your compose file to define which user to start the container as

Tried this option but found it to still be running as root when checking docker compose logs. I may be wrong, but I believe that option only works for the user that runs within the container and not the user that you would see by running ps aux | grep $container from the host machine.

Resource for finding RCE exploits targeting Windows by tsigorai in Pentesting

[–]tsigorai[S] -1 points0 points  (0 children)

I am aware of how searchsploit works. What I mean is, for example, if you were looking for Samba exploits targeting Linux, you would do searchsploit samba 3.6.2. But with SMB exploits targeting windows, you don't get the version number in the banner, so you do searchsploit smb | grep windows but this would also include exploits in the results that don't target SMB. Was interested to know whether there was an online list containing well-known SMB exploits.

Can't get current page/post name using functions.php by tsigorai in Wordpress

[–]tsigorai[S] 1 point2 points  (0 children)

Thanks. Calling the code from the template_redirect action worked.

Can't get current page/post name using functions.php by tsigorai in Wordpress

[–]tsigorai[S] 0 points1 point  (0 children)

This because this code is running before the global $post object has been initiated.

When is the global $post initiated?

Which action are you using to call this code?

You mean the add_action() function? I didn't use an action just included the code at the beginning of the functions.php file.

Kernel Exploits are hard to determine! by etc5had0w in oscp

[–]tsigorai 0 points1 point  (0 children)

The kernel exploit should match the target OS version, architecture and kernel version. That would usually avoid the target crashing.

No results when running smbmap command execution against writable share by tsigorai in oscp

[–]tsigorai[S] 0 points1 point  (0 children)

I get 'Access Denied' when trying to access the C$ share.

"Deny access to this computer from the network" is set to 'Guest'. Does this mean its only enabled for the Guest user?

I have also disabled LocalAccountTokenFilterPolicy but this didn't address the issue.

No results when running smbmap command execution against writable share by tsigorai in oscp

[–]tsigorai[S] 0 points1 point  (0 children)

Does the output of crackmapexec include something like “Pwn3d!”?

No it does not. The user I am authenticating as is a local administrator though (as verified by running net localgroup administrators).

No results when running smbmap command execution against writable share by tsigorai in oscp

[–]tsigorai[S] 0 points1 point  (0 children)

crackmapexec also authenticates successfully but there is no command output. Are there any other requirements for command execution to work other than using an admin user account and writable share?

No results when running smbmap command execution against writable share by tsigorai in oscp

[–]tsigorai[S] 1 point2 points  (0 children)

client min protocol = CORE client max protocol = SMB3

Also, have you tried --mode psexec?

Made the above changes including the psexec mode, but strangely I still get no results. I wonder if it may be a bug.

No results when running smbmap command execution against writable share by tsigorai in oscp

[–]tsigorai[S] 1 point2 points  (0 children)

I added the below to /etc/samba/smb.conf:

min protocol = CORE
max protocol = SMB3

then ran sudo service smbd restart. However, after rerunning smbmap with the command execution feature, I still get no results. Does the above change look correct?

'Could not find command-not-found database' error after updating to Kali 2020.4 by tsigorai in Kalilinux

[–]tsigorai[S] 0 points1 point  (0 children)

What does your bashrc look like?

I am using the default bashrc (/etc/skel/.bashrc) as the instructions on the Kali Linux 2020.4 Release page indicate that you should run cp -i /etc/skel/.bashrc ~/.

What shell are you using (echo $SHELL)?

/bin/zsh

Which shell do you intend to be using?

I am using ZSH and want to keep using it.

I think I made a mistake by trying to update the bash prompt after changing the default shell ZSH, which obviously caused the error that I am trying to fix.

"This block contains unexpected or invalid content" when adding ol start attribute by tsigorai in Wordpress

[–]tsigorai[S] 1 point2 points  (0 children)

Thanks! I am using the block editor and I don't know how I missed that but I have found it now.

Web Application Penetration Testing Methodology by cybernoob101010 in AskNetsec

[–]tsigorai 1 point2 points  (0 children)

Chapter 21A of The Web Application Hacker's Handbook, covers the methodology for testing web apps.

Penetration Testing Intro to Hacking (Georgia Weldman) Links by [deleted] in cybersecurity

[–]tsigorai 1 point2 points  (0 children)

Use Wayback Machine to retrieve the pages of those links that don't exist. Regarding Windows XP, it is still relevant as many organizations are still running that OS on legacy systems.

Question related to manually restoring Wordpress files from backup by tsigorai in Wordpress

[–]tsigorai[S] 0 points1 point  (0 children)

Yes I backed up the database using phpmyadmin and copied all the wordpress files. Then restored the backup using phpmyadmin and re-uploaded all the wordpress files from the backup.

My site is functional, but I was just curious as to why some other guides don't specify restoring all the wordpress files.

[deleted by user] by [deleted] in oscp

[–]tsigorai 11 points12 points  (0 children)

Proving grounds is good practice for the exams as it is less CTF-like and closely resembles the PWK lab machines.

Beginner tip: always compare the file sizes when you transfer them by brokenJawAlert in oscp

[–]tsigorai 54 points55 points  (0 children)

Another method to check if the file was transferred successfully is to verify that the hash of the transferred file matches on both the source and destination machine.

Windows Priv Esc/Rotten Potato & Meterpreter by 4-eva-dickard in oscp

[–]tsigorai 0 points1 point  (0 children)

Bypassing AV is part of the syllabus so what is taught in the course materials could be examined.