#hack100days Day63: Hack the Box Academy today. Worked on LFI module. #infosec #cososec
#hack100days Day64: Started a multiday CTF. Got three of the first five challenges presented and am sitting on 800/1000 points. Going to sit in on Alh4zr3d stream before making dinner and watching the Jan6 shennanigans. #infosec #cososec
#hack100days Day65: Looked at the CTF again. No new challenges. Did more enum on one of the remaining, but didn't make progress. Hit Offsec Proving Grounds Play and pwned "Dawn", so that helped recover some ego. #infosec #cososec
#hack100days Day66: Took a quick look at an Offsec Proving Grounds Play box. Found an LFI. Have a couple of users. Didn't find anything else terribly fun. Making a run at brute forcing a password. #infosec #cososec
#hack100days Day67: Hack the Box Academy, did the ffuf module. #infosec #cososec
#hack100days Day68: More work on Hack the Box Academy and on the ffuf module. Not making it through it as fast as I would like. Practice make perfect! #infosec #cososec
#hack100days Day69: More work on HtB Academy & ffuf. One more exercise to complete. Also kibbutzed on Al4zr3d stream while he walked through a couple of TryHackMe boxes. #infosec #cososec
#hack100days Day70: More work on HtB Academy & ffuf. Made some progress and then stalled. Looks like word list choice is finicky. Read this article and found it pretty interesting: https://blog.includesecurity.com/2022/07/hunting-for-mass-assignment-vulnerabilities-using-github-codesearch-and-grep-app/. Signed up for the beta of git CodeSearch. #infosec #cososec
#hack100days Day71: almost forgot to log it. Watched a stream. Hacked on a ctf. Figured out limited rce, but stumped on turning it into something really useful. It’ll be on tomorrow, so maybe a fresh look after sleep and coffee. #infosec #cososec #ctf
#hack100days Day72: Continued banging on ctf. Limited rce was sneaky rabbit hole. Found correct path to get shell. New one on me, so that was fun. Working on pivot point. This one's a little tougher. #infosec #cososec
#hack100days Day72.1: Update. I eventually figured the pivot—“pcap, or it didn’t happen!” Learned a bit more about Docker and worked on Wireshark skill. Ended up w/in top 10 and got a cyberrange voucher from the prize pool. I reckon there were between 50 and 100 people taking a crack at it. #infosec #cososec #hackinonthepatio
#hack100days Day73: Took a crack at today's release on HtB. Bunch of enumeration. Still poking around to find entry point. Not a webserver and I'm out of practice on anything but web servers, so this is good. Slow. But good. #infosec #cososec
#hack100days Day74: Found a user w/low priv on the HtB box--based on the hostname, I took a flyer at a username I thought would match. Was able to use it to enumerate some additional users. Now brute-forcing for passwords. No school like the old school. Really wish folks would use fasttrack.txt for password brute forcing. Fairly long list of users, so this will take a while. #infosec #cososec
#hack100days Day75: Got my CTF prize, a month-long access to Offsec Proving Grounds Practice, so started on that. Hitting the first easy box. Basic enumeration in-flight. SSH, DNS, and two web services and and two mqueue listeners. #infosec #cososec
#hack100days Day76: Listened in on a couple of twitch streams by Alh4zr3d and mmtaggart. Poked at a Winderz box on offsec proving grounds. #infosec #cososec #alwaysbeenumerating
#hack100days Day77: I finished last night's target on Offsec PG Practice. Started in on a new one today. Bluekeep is a spooky vuln. Should be done w/that one soon. #infosec #cososec #patchyoshit
#hack100days Day78: Went along with the Alh4zr3d stream on a PG Play box. Rated as hard. Got a bead on the foothold. Slowing down to make some notes. Make brain wrinkles and have something to come back to in the future--tags, MF! #infosec #cososec #tags #sqli #weakasspasswords
#hack100days Day 79: Didn’t make time to get hands on keyboard today. Started _Web Application Hacker's Handbook_ and got through first two chapters. While it’s 11 years old, still seems pretty relevant. #infosec #cososec #authn #authz #inputvalidation
#hack100days Day80: Read ch 3 of _Web Application Hacker’s Handbook_. #infosec #cososec (fixed unfortunate typo)
#hack100days Day81: Started Practical Web Application Security and Testing class from mttaggart #infosec #cososec
#hack100days Day82: Read ch 4 of _Web Application Hacker’s Handbook_. #infosec #cososec #enumallthethings
#hack100days Day83: Hands on keyboard today! Worked on a pair of TryHackMe boxes. One down pretty quickly. Some progress on the second. Using msfconsole and msfvenom on that one. Issue w/getting handler and payload to match. Don't use it a whole lot, so more googling than I like. #infosec #cososec
#hack100days Day83.1 Update: Finished 2nd box. Reset box and switched to meterpreter shell instead of trying to use command shell. Worked great. #infosec #cososec
#hack100days Day84: Poked at a box on another platform. Looks like BlueKeep is the way in, but metasploit module is for x64 and the target is x86. Found a PoC for x86, but I'm fighting python module dependencies. I need to get better at venv, I guess. Then the clock ran out, so I can't pick at it until tomorrow. #infosec #cososec
#hack100days Day85: D’oh. Forgot to record yesterday. Worked on HtB Blackfield. I’m really liking CrackMapExec. Refreshed the Impacket brain wrinkles. #infosec #cososec
#hack100days Day86: spent day off and on working on getting parrot and kali 2023 on hyper-v. Not an awesome experience.
#hack100days Day87: Revisited Ubuntu Multipass and toolbox to run impacket, etc. from. Poked at academy.htb #infosec #cososec
#hack100days Day89: Took a crack at an Offsec Proving Grounds box. Learned more how to deal with open proxies. (Wish I'd known how to do this a couple of years ago.) #infosec #cososec
#hack100days Day90: Took a crack at Hack the Box machine return. I love evil-winrm. Got user pretty quick. Working on priv esc. Should put it away tonight. #infosec #cososec
#hack100days Day91: Kept banging on 'return' off and on through the day. Some guidance, based on the results of whoami with priv flag, didn't work as expected. Spun up neo4j and bolt on my infra box for BloodHound. Listened in on mtaggart stream and learned a bit about Content-Security-Policy. #infosec #cososec
#hack100days Day92: Today was not as productive as the past two. Did get in some time on alh4zr3d’s stream as he worked on a Try Hack Me box. Couple of tools referenced there look interesting. #infosec #cososec
#hack100days Day93: No hands on keyboard hacking today. Read up on Active Directory to refresh and rebuild mental model of what it looks like on a network. #infosec #cososec
#hack100days Day94: Forgot to log yesterday’s activity. Worked on HtB Health with some folks. Worked on python scripting skills. #infosec #cososec
#hack100days Day95: Finished of HtB Health. Glad to have worked with a team. For an "easy" box, that felt far from it. Now to watch some web app hacking videos. #infosec #cososec
#hack100days Day96: More watching Practical Web Application Security and Testing from academy.tcm-sec.com. Might poke at another HtB box before day is done. #infosec #cososec
#hack100days Day97: Found alkanesollutions.co.uk/2021/02/26/list-ad-sites-and-subnets-using-powershell today. Very nice. Last time I poked at AD w/powershell I used the activedirectory module. Thought it was required. This doesn’t need that. Gonna refactor to output in a format more to my preference. Good place to start when mapping a network, ya? #infosec #cososec
#hack100days Day98: More time on Practical Web Application Security and testing. Another section down. #infosec #cososec
#hack100days Day98: More time on Practical Web Application Security and Testing. #infosec #cososec
#hack100days Day100: Hacked on the new HtB release didn’t get far. #infosec #cososec
@scottlink Well done for making it to day 100 and sticking at it 👍