Tag: writeup

  • Solve a GEOINT challenge with your brain – #ThursdayQuiz

    Hi everyone! In this blog post, we’ll see an example of how to solve an interesting GEOINT challenge based on observations from a photo, without using any reverse image search tools or IA things. Only our marvellous brain. This challenge is proposed by Sector035 on his Twitter account. I encourage you to first try yourself…

    Lire plus: Solve a GEOINT challenge with your brain – #ThursdayQuiz
  • APT Hunter CTF – Writeup

    Le week-end du 27 mars 2024 a débuté le CTF APT Hunter organisé par des étudiants de l’école AIX YNOV CAMPUS. Ce CTF consistait en un ensemble de 40 challenges qui touchaient différents domaines allant du GEOINT, au SOCMINT en passant par de l’investigation de cryptomonnaie et NFTs. Nous avons terminé 4ème avec notre équipe…

    Lire plus: APT Hunter CTF – Writeup
  • HEXA OSINT CTF v3 – Writeup

    The HEXA OSINT CTF v3 is the final episode of this series of CTFs. Link to the ctfd platform: https://hexaosint.ctfd.io/ Final scoreboard (top 10): With my team (Incompetent Detectives: kortez, bouddah, Dr.Nova and KrowZ (myself)), we managed to finish in 6th position. It was very fun and a bit stressful but we learned a lot…

    Lire plus: HEXA OSINT CTF v3 – Writeup
  • 💻 Mirai – Writeup

    Default credentials we’ll be used on this machine to access it. Add the IP address in /etc/hosts: … 10.10.10.48 mirai.htb … First run a nmap scan: A lot of ports are open contrary to the other easy boxes. Let’s start with the website: It tells us that the machine is a Pi-hole version 3.1.4. We…

    Lire plus: 💻 Mirai – Writeup
  • 💻 Legacy – Writeup

    We’ll use a very famous CVE vulnerability to exploit this machine. Add the IP address in /etc/hosts: … 10.10.10.4 legacy.htb … First run a nmap scan: Only 2 ports seem interesting: 139 and 445 which are SMB ports. We can run some enumeration on them: We got some data but nothing really useful. smbclientdoesn’t return…

    Lire plus: 💻 Legacy – Writeup
  • 💻 Lame – Writeup

    We’ll try to gain root access to the easiest HTB machine. Add the IP address in /etc/hosts: … 10.10.10.3 lame.htb … First run a nmap scan: There are 4 open ports (port 3622 is a false positive): FTP: Anonymous login is allowed, meaning we can connect to it without any password. We can also check…

    Lire plus: 💻 Lame – Writeup
  • 💻 Knife – Writeup

    A backdoor is found on the web server of this machine. Add the IP address in /etc/hosts: … 10.10.10.242 knife.htb … First run a nmap scan: The website doesn’t give us anything useful: In the source code there is no link. Looking at Wappalyzer we get some versions: Apache 2.4.41 PHP 8.1.0 There is no…

    Lire plus: 💻 Knife – Writeup
  • 💻 Jerry – Writeup

    We’ll exploit a Tomcat functionnality to become Administrator of this Windows machine. Add the IP address in /etc/hosts: … 10.10.10.95 jerry.htb … First run a nmap scan: There is only one port open: We can search on Google for an exploit related to this version: There’s an ExploitDB exploit for this version. Let’s see if…

    Lire plus: 💻 Jerry – Writeup
  • 💻 Granny – Writeup

    This Windows machine looks a lot like another machine… Add the IP address in /etc/hosts: … 10.10.10.15 granny.htb … First run a nmap scan: We can run a directory fuzzing but nothing interesting is found: Here is the only page accessible on the website: This is a webdav server and there is a tool to…

    Lire plus: 💻 Granny – Writeup
  • 💻 Grandpa – Writeup

    In this machine we’ll exploit a kernel vulnerability to become Administrator. Add the IP address in /etc/hosts: … 10.10.10.14 grandpa.htb … First run a nmap scan: There is only one port open which is an HTTP service on port 80. It is detected as being a Windows machine running Microsoft IIS httpd 6.0. We can…

    Lire plus: 💻 Grandpa – Writeup