malloc.me
https://malloc.me/
Recent content on malloc.me
Hugo
en-us
© Marc
Wed, 11 Dec 2024 23:34:45 +1100
-
Corporate
https://malloc.me/posts/2024/05/corporate/
Mon, 06 May 2024 01:57:45 +1000
https://malloc.me/posts/2024/05/corporate/
<h2 id="tools-used">Tools Used</h2>
<ul>
<li>terminal</li>
<li>obsidian</li>
<li>tmux</li>
<li>openvpn</li>
<li>nmap</li>
<li>chromium</li>
<li>python</li>
<li>gobuster</li>
<li>hydra</li>
</ul>
<h2 id="initial-enumeration">Initial Enumeration</h2>
<p>Add <code>corporate</code> and <code>corporate.htb</code> to the hosts file.</p>
<h3 id="port-scan">Port Scan</h3>
<p><code>nmap -sS -sV -A -O -T4 corporate.htb</code></p>
<ul>
<li>Port 80</li>
<li>openresty/1.21.4.3
<ul>
<li>No obvious CVEs</li>
</ul>
</li>
</ul>
<h2 id="foothold">Foothold</h2>
<h3 id="attacking-corporatehtb">Attacking <code>corporate.htb</code></h3>
<p>Port 80 serves a website for Corporate, with most of the pages being static HTML, as is typical with HackTheBox challenges.</p>
<h4 id="enumerating-directories">Enumerating Directories</h4>
<p>Running <code>gobuster</code> against the <code>corporate.htb</code> domain wasn’t super interesting, but revealed two folders worth exploring later: <code>/assets</code> and <code>/vendor</code>.</p>
-
Attended
https://malloc.me/posts/2021/05/attended/
Sat, 08 May 2021 16:00:00 +0000
https://malloc.me/posts/2021/05/attended/
<p><a href="https://hackthebox.eu/home/machines/profile/307">Attended</a> is an insane-rated machine on HackTheBox created by <a href="https://www.hackthebox.eu/home/users/profile/8292">guly</a> and <a href="https://www.hackthebox.eu/home/users/profile/46502">freshness</a>. Owning this machine involves thorough enumeration of services, lesser-common methods of exfiltrating data and knowledge of binary reversing, exploitation with ROP, x86_64 calling conventions, usage of OpenBSD, and knowledge of how RSA keys are structured and formed.</p>
<p>Thanks to <a href="https://www.hackthebox.eu/home/users/profile/340449">frostb1te</a>, especially for information about RSA keys.</p>
<h2 id="initial-enumeration">Initial Enumeration</h2>
<p>After configuring <code>/etc/hosts</code> to contain an entry for <code>attended.htb</code> and the box IP address, we can start out with a basic nmap scan of our target using <code>nmap -sS -sV -A -T4 10.10.10.221</code> which yields the following results about the target machine:</p>
-
About
https://malloc.me/about/
Mon, 01 Jan 0001 00:00:00 +0000
https://malloc.me/about/
<p>I’m Marc, a security engineer. If you’d like to reach out, you can email me at <!-- raw HTML omitted --><a href="mailto:[email protected]">[email protected]</a><!-- raw HTML omitted -->.</p>
<p>If you’re interested in CTF write-ups or other ramblings, check out <a href="https://malloc.me/posts">my posts</a><!-- raw HTML omitted -->.</p>